Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.116.248.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.116.248.55.			IN	A

;; AUTHORITY SECTION:
.			424	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:21:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 55.248.116.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.248.116.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.20.184.221 attack
Nov  2 07:50:11 web1 postfix/smtpd[17792]: warning: unknown[123.20.184.221]: SASL PLAIN authentication failed: authentication failure
...
2019-11-03 02:58:59
80.82.70.118 attack
80.82.70.118 was recorded 6 times by 4 hosts attempting to connect to the following ports: 6881,3460,8443,9091,137. Incident counter (4h, 24h, all-time): 6, 36, 36
2019-11-03 03:04:40
171.240.185.106 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 02-11-2019 11:50:24.
2019-11-03 02:49:14
52.183.61.209 attack
SMTP/25/465/587 Probe, BadAuth, SPAM, Hack -
2019-11-03 03:03:30
185.156.73.52 attackspam
11/02/2019-14:46:54.054939 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-03 02:52:36
154.120.227.130 attackspam
Honeypot attack, port: 445, PTR: cust-ce.liquidtelecom.net.
2019-11-03 02:38:07
91.224.60.75 attackbotsspam
Nov  2 03:11:03 auw2 sshd\[6678\]: Invalid user 321qwedsazxc from 91.224.60.75
Nov  2 03:11:03 auw2 sshd\[6678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.60.75
Nov  2 03:11:04 auw2 sshd\[6678\]: Failed password for invalid user 321qwedsazxc from 91.224.60.75 port 36938 ssh2
Nov  2 03:15:16 auw2 sshd\[7025\]: Invalid user fotos from 91.224.60.75
Nov  2 03:15:16 auw2 sshd\[7025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.60.75
2019-11-03 02:46:09
103.114.107.129 attackbotsspam
Unauthorized connection attempt from IP address 103.114.107.129 on Port 3389(RDP)
2019-11-03 02:41:16
223.80.100.87 attackbots
$f2bV_matches
2019-11-03 02:40:58
13.77.142.89 attackbotsspam
2019-11-02T14:50:38.346892tmaserv sshd\[4064\]: Invalid user kl from 13.77.142.89 port 60238
2019-11-02T14:50:38.353348tmaserv sshd\[4064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.142.89
2019-11-02T14:50:40.423629tmaserv sshd\[4064\]: Failed password for invalid user kl from 13.77.142.89 port 60238 ssh2
2019-11-02T14:55:34.534601tmaserv sshd\[4310\]: Invalid user isis from 13.77.142.89 port 44512
2019-11-02T14:55:34.539949tmaserv sshd\[4310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.142.89
2019-11-02T14:55:36.244356tmaserv sshd\[4310\]: Failed password for invalid user isis from 13.77.142.89 port 44512 ssh2
...
2019-11-03 02:56:19
104.8.43.232 attackspambots
firewall-block, port(s): 82/tcp
2019-11-03 02:39:11
77.42.118.49 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-03 02:50:01
191.101.165.103 attackbotsspam
bulk spam - http://go.theismyk.com
2019-11-03 02:57:26
37.114.183.25 attackbotsspam
Brute force attempt
2019-11-03 02:58:22
183.201.250.7 attack
2019-10-31 16:55:28 server sshd[87272]: Failed password for invalid user root from 183.201.250.7 port 40408 ssh2
2019-11-03 02:28:58

Recently Reported IPs

104.248.14.84 111.32.113.97 91.209.114.245 200.194.23.219
209.59.186.71 42.230.205.207 14.20.88.167 187.162.119.143
138.68.250.159 151.232.72.20 113.189.183.249 49.37.195.40
193.233.82.101 41.92.12.203 193.163.125.108 178.85.226.68
191.240.115.199 119.91.64.101 211.36.141.74 181.126.231.194