Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wallingford Center

Region: Connecticut

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.55.110.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.55.110.59.			IN	A

;; AUTHORITY SECTION:
.			345	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080200 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 02 18:31:10 CST 2020
;; MSG SIZE  rcvd: 117
Host info
59.110.55.104.in-addr.arpa domain name pointer 104-55-110-59.lightspeed.wlfrct.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
59.110.55.104.in-addr.arpa	name = 104-55-110-59.lightspeed.wlfrct.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.65.144.233 attackspam
Jan  4 14:57:39 v22018053744266470 sshd[21241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.144.233
Jan  4 14:57:42 v22018053744266470 sshd[21241]: Failed password for invalid user oracle from 159.65.144.233 port 43439 ssh2
Jan  4 14:59:56 v22018053744266470 sshd[21432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.144.233
...
2020-01-04 22:07:12
106.12.3.170 attackspam
2020-01-04T14:39:06.495309scmdmz1 sshd[13705]: Invalid user user from 106.12.3.170 port 49768
2020-01-04T14:39:06.498172scmdmz1 sshd[13705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.3.170
2020-01-04T14:39:06.495309scmdmz1 sshd[13705]: Invalid user user from 106.12.3.170 port 49768
2020-01-04T14:39:08.343028scmdmz1 sshd[13705]: Failed password for invalid user user from 106.12.3.170 port 49768 ssh2
2020-01-04T14:41:39.890176scmdmz1 sshd[13919]: Invalid user lan from 106.12.3.170 port 37196
...
2020-01-04 22:05:47
112.215.141.101 attack
Unauthorized connection attempt detected from IP address 112.215.141.101 to port 2220 [J]
2020-01-04 22:26:25
92.246.76.244 attack
Jan  4 14:53:36 debian-2gb-nbg1-2 kernel: \[405340.719856\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.246.76.244 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=56285 PROTO=TCP SPT=41657 DPT=620 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-04 22:07:44
14.178.144.53 attackspambots
Unauthorized connection attempt from IP address 14.178.144.53 on Port 445(SMB)
2020-01-04 22:12:51
42.2.216.18 attackspambots
Honeypot attack, port: 5555, PTR: 42-2-216-018.static.netvigator.com.
2020-01-04 22:36:36
195.9.219.74 attack
20/1/4@08:15:02: FAIL: Alarm-Network address from=195.9.219.74
...
2020-01-04 22:21:28
139.5.18.3 attack
Unauthorised access (Jan  4) SRC=139.5.18.3 LEN=52 TTL=110 ID=14868 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-04 22:37:47
186.206.135.130 attack
Unauthorized connection attempt detected from IP address 186.206.135.130 to port 2220 [J]
2020-01-04 22:23:38
66.70.188.152 attackspambots
_ltvn
2020-01-04 22:03:18
49.48.247.101 attackbotsspam
Bruteforce on SSH Honeypot
2020-01-04 22:40:28
222.186.180.130 attackspambots
Jan  4 13:45:22 Ubuntu-1404-trusty-64-minimal sshd\[28696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Jan  4 13:45:24 Ubuntu-1404-trusty-64-minimal sshd\[28696\]: Failed password for root from 222.186.180.130 port 34780 ssh2
Jan  4 13:45:27 Ubuntu-1404-trusty-64-minimal sshd\[28696\]: Failed password for root from 222.186.180.130 port 34780 ssh2
Jan  4 13:45:29 Ubuntu-1404-trusty-64-minimal sshd\[28696\]: Failed password for root from 222.186.180.130 port 34780 ssh2
Jan  4 15:35:53 Ubuntu-1404-trusty-64-minimal sshd\[24080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-01-04 22:38:27
68.183.204.24 attack
Unauthorized connection attempt detected from IP address 68.183.204.24 to port 2220 [J]
2020-01-04 22:47:08
104.155.2.172 attackspambots
104.155.2.172 - - \[04/Jan/2020:05:13:35 -0800\] "GET /a\?___store=english\&___from_store=english HTTP/1.1" 404 20554104.155.2.172 - - \[04/Jan/2020:05:13:36 -0800\] "GET /a\?___store=spanish\&___from_store=english HTTP/1.1" 404 24294104.155.2.172 - - \[04/Jan/2020:05:14:36 -0800\] "GET /util/login.aspx HTTP/1.1" 404 20610
...
2020-01-04 22:41:31
49.88.112.62 attackbots
Jan  4 15:07:23 MK-Soft-Root2 sshd[10246]: Failed password for root from 49.88.112.62 port 56707 ssh2
Jan  4 15:07:27 MK-Soft-Root2 sshd[10246]: Failed password for root from 49.88.112.62 port 56707 ssh2
...
2020-01-04 22:19:53

Recently Reported IPs

185.234.219.228 163.172.51.75 124.16.75.28 27.147.151.178
122.225.85.61 166.175.56.182 161.240.50.121 185.153.49.64
118.70.248.79 140.203.175.250 169.252.56.56 157.245.245.159
154.19.82.153 94.155.72.155 196.88.185.251 24.62.52.203
121.161.219.30 37.59.47.61 135.110.175.21 144.48.168.21