Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 7.55.90.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12901
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;7.55.90.149.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 12:16:29 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 149.90.55.7.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.90.55.7.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
87.251.74.48 attackspambots
SSH Bruteforce on Honeypot
2020-05-21 04:20:02
88.214.26.53 attack
SmallBizIT.US 1 packets to tcp(3389)
2020-05-21 04:19:37
92.53.65.40 attackspam
05/20/2020-14:25:02.834528 92.53.65.40 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-21 04:17:45
220.128.159.121 attackbots
Invalid user sfe from 220.128.159.121 port 33346
2020-05-21 04:37:04
2001:da8:20b:200:100::99 attackspam
Web Server Scan. RayID: 5957effbccd7eaf0, UA: Mozilla/5.051975669 Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36, Country: CN
2020-05-21 04:29:00
93.174.93.195 attack
93.174.93.195 was recorded 7 times by 4 hosts attempting to connect to the following ports: 40884,40885. Incident counter (4h, 24h, all-time): 7, 38, 9451
2020-05-21 04:16:07
45.165.177.9 attackspambots
May 20 18:00:22 debian-2gb-nbg1-2 kernel: \[12249247.852511\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.165.177.9 DST=195.201.40.59 LEN=214 TOS=0x00 PREC=0x00 TTL=113 ID=28174 PROTO=UDP SPT=59922 DPT=51660 LEN=194
2020-05-21 04:25:43
123.158.61.127 attack
Web Server Scan. RayID: 590c5c7f9d280256, UA: Mozilla/5.0101097241 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36, Country: CN
2020-05-21 04:02:00
83.240.61.181 attackbotsspam
SmallBizIT.US 1 packets to tcp(8291)
2020-05-21 04:21:12
45.141.87.4 attackbotsspam
TCP port 10000: Scan and connection
2020-05-21 04:26:08
1.207.106.6 attackspambots
20.05.2020 18:00:52 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2020-05-21 04:37:47
112.112.246.55 attackbotsspam
Web Server Scan. RayID: 5916019b9f56d3a2, UA: python-requests/2.21.0, Country: CN
2020-05-21 04:11:06
92.118.161.21 attackbotsspam
Icarus honeypot on github
2020-05-21 04:17:03
116.57.206.245 attack
Web Server Scan. RayID: 58e4ec88b9ccd39a, UA: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50, Country: CN
2020-05-21 04:07:11
117.136.56.86 attack
Web Server Scan. RayID: 5900c5c3c858fced, UA: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:6.0) Gecko/20100101 Firefox/6.0, Country: CN
2020-05-21 04:06:09

Recently Reported IPs

12.80.38.239 109.230.60.161 37.5.197.162 156.100.182.206
192.140.14.48 90.183.16.99 34.198.163.191 71.38.166.191
91.38.144.217 51.29.144.95 79.86.219.167 132.142.55.223
174.45.233.123 222.65.100.15 43.7.118.150 167.185.180.161
44.48.38.231 6.172.215.197 134.44.149.17 209.143.186.63