Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Alpharetta

Region: Georgia

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.49.55.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38445
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.49.55.225.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072800 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 29 00:51:15 CST 2019
;; MSG SIZE  rcvd: 117
Host info
225.55.49.104.in-addr.arpa domain name pointer 104-49-55-225.lightspeed.tukrga.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
225.55.49.104.in-addr.arpa	name = 104-49-55-225.lightspeed.tukrga.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.1.209.245 attack
Feb 25 10:39:24 sso sshd[11053]: Failed password for root from 103.1.209.245 port 44706 ssh2
...
2020-02-25 18:50:21
1.54.170.140 attack
Unauthorized connection attempt detected from IP address 1.54.170.140 to port 2323
2020-02-25 18:23:37
125.27.185.224 attackspam
Feb 25 09:23:09 www5 sshd\[30119\]: Invalid user test from 125.27.185.224
Feb 25 09:23:09 www5 sshd\[30119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.27.185.224
Feb 25 09:23:11 www5 sshd\[30119\]: Failed password for invalid user test from 125.27.185.224 port 54975 ssh2
...
2020-02-25 18:50:48
103.254.170.126 attackspam
Feb 25 08:24:03 raspberrypi sshd\[31302\]: Invalid user admin from 103.254.170.126
...
2020-02-25 18:24:44
43.231.61.146 attack
Feb 25 11:03:31 sd-53420 sshd\[21146\]: Invalid user test from 43.231.61.146
Feb 25 11:03:31 sd-53420 sshd\[21146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.231.61.146
Feb 25 11:03:33 sd-53420 sshd\[21146\]: Failed password for invalid user test from 43.231.61.146 port 35482 ssh2
Feb 25 11:11:23 sd-53420 sshd\[21904\]: Invalid user carlo from 43.231.61.146
Feb 25 11:11:23 sd-53420 sshd\[21904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.231.61.146
...
2020-02-25 18:15:42
178.176.194.87 attack
firewall-block, port(s): 23/tcp
2020-02-25 18:25:35
171.244.36.89 attackbotsspam
Port probing on unauthorized port 3389
2020-02-25 18:14:04
198.108.67.101 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 12323 proto: TCP cat: Misc Attack
2020-02-25 18:48:16
108.170.19.46 attack
" "
2020-02-25 18:45:43
189.140.8.153 attack
1582615430 - 02/25/2020 08:23:50 Host: 189.140.8.153/189.140.8.153 Port: 445 TCP Blocked
2020-02-25 18:32:44
49.234.18.158 attackspambots
Feb 25 10:18:12 server sshd\[20215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158  user=uucp
Feb 25 10:18:14 server sshd\[20215\]: Failed password for uucp from 49.234.18.158 port 54328 ssh2
Feb 25 10:23:55 server sshd\[21170\]: Invalid user uftp from 49.234.18.158
Feb 25 10:23:55 server sshd\[21170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 
Feb 25 10:23:58 server sshd\[21170\]: Failed password for invalid user uftp from 49.234.18.158 port 56898 ssh2
...
2020-02-25 18:28:06
27.78.14.83 attackspam
Feb 25 17:29:10 webhost01 sshd[13399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.78.14.83
...
2020-02-25 18:57:42
138.197.105.79 attack
Feb 25 11:08:45 dev0-dcde-rnet sshd[429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.105.79
Feb 25 11:08:47 dev0-dcde-rnet sshd[429]: Failed password for invalid user user from 138.197.105.79 port 42114 ssh2
Feb 25 11:12:15 dev0-dcde-rnet sshd[499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.105.79
2020-02-25 18:18:58
82.64.204.164 attackbotsspam
SSH-bruteforce attempts
2020-02-25 18:55:07
61.160.82.82 attackspam
Feb 25 10:05:32 serwer sshd\[748\]: Invalid user coslive from 61.160.82.82 port 21853
Feb 25 10:05:32 serwer sshd\[748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.82.82
Feb 25 10:05:34 serwer sshd\[748\]: Failed password for invalid user coslive from 61.160.82.82 port 21853 ssh2
...
2020-02-25 18:21:15

Recently Reported IPs

134.0.119.93 174.85.69.46 27.206.222.140 178.232.105.26
228.165.226.211 68.183.67.118 126.56.178.240 128.78.146.219
210.77.112.189 218.142.207.246 225.67.92.58 90.71.3.161
114.236.79.42 207.0.233.45 49.69.175.172 77.92.32.184
84.157.202.53 95.210.208.119 184.186.51.26 190.255.122.91