Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.98.80.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28911
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.98.80.138.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 04:02:55 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 138.80.98.55.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 55.98.80.138.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
134.209.100.26 attackbotsspam
Apr 29 17:57:04 dev0-dcde-rnet sshd[11131]: Failed password for root from 134.209.100.26 port 43318 ssh2
Apr 29 18:01:35 dev0-dcde-rnet sshd[11194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.100.26
Apr 29 18:01:37 dev0-dcde-rnet sshd[11194]: Failed password for invalid user rapa from 134.209.100.26 port 54006 ssh2
2020-04-30 01:31:40
182.254.154.89 attack
Invalid user zabbix from 182.254.154.89 port 35038
2020-04-30 01:58:58
193.70.37.148 attackbotsspam
Invalid user teamspeak3 from 193.70.37.148 port 41736
2020-04-30 01:57:37
118.25.27.67 attackbots
$f2bV_matches
2020-04-30 01:34:53
116.255.190.176 attack
Invalid user test3 from 116.255.190.176 port 55850
2020-04-30 01:36:22
103.45.101.7 attackbots
Invalid user admin from 103.45.101.7 port 44420
2020-04-30 01:43:54
221.165.252.143 attackspam
Invalid user testing from 221.165.252.143 port 48464
2020-04-30 01:54:21
111.230.13.11 attackspambots
Failed password for root from 111.230.13.11 port 54490 ssh2
2020-04-30 01:38:28
194.182.71.107 attackspambots
Apr 29 15:47:46 roki-contabo sshd\[5215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.71.107  user=root
Apr 29 15:47:48 roki-contabo sshd\[5215\]: Failed password for root from 194.182.71.107 port 47348 ssh2
Apr 29 15:54:20 roki-contabo sshd\[5333\]: Invalid user rocco from 194.182.71.107
Apr 29 15:54:20 roki-contabo sshd\[5333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.71.107
Apr 29 15:54:22 roki-contabo sshd\[5333\]: Failed password for invalid user rocco from 194.182.71.107 port 47242 ssh2
...
2020-04-30 01:20:10
61.133.232.249 attackbotsspam
Invalid user box from 61.133.232.249 port 58281
2020-04-30 01:49:04
182.61.5.148 attack
2020-04-28 00:27:14 server sshd[69239]: Failed password for invalid user teamspeak from 182.61.5.148 port 41096 ssh2
2020-04-30 01:24:47
106.12.93.25 attack
$f2bV_matches
2020-04-30 01:42:50
104.236.175.127 attack
Apr 29 13:24:10 ny01 sshd[28099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.175.127
Apr 29 13:24:12 ny01 sshd[28099]: Failed password for invalid user Joshua from 104.236.175.127 port 38696 ssh2
Apr 29 13:28:26 ny01 sshd[29160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.175.127
2020-04-30 01:43:06
1.9.78.242 attackbots
Failed password for postgres from 1.9.78.242 port 37289 ssh2
2020-04-30 01:54:04
122.51.182.181 attackbots
Invalid user qu from 122.51.182.181 port 38640
2020-04-30 01:34:18

Recently Reported IPs

164.230.17.69 200.177.158.153 130.86.253.136 215.246.57.166
126.196.105.3 121.154.143.153 35.1.250.137 17.159.198.76
245.60.128.65 211.140.64.87 50.144.79.31 173.149.164.251
33.24.227.42 23.80.6.176 84.133.122.86 240.42.169.69
185.36.209.194 29.162.252.145 43.121.105.21 51.95.243.193