Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oakland

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.55.38.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.55.38.249.			IN	A

;; AUTHORITY SECTION:
.			390	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121501 1800 900 604800 86400

;; Query time: 192 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 16 07:01:47 CST 2019
;; MSG SIZE  rcvd: 117
Host info
249.38.55.104.in-addr.arpa domain name pointer 104-55-38-249.lightspeed.sntcca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.38.55.104.in-addr.arpa	name = 104-55-38-249.lightspeed.sntcca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.249.211.242 attackspambots
SSH Brute Force
2020-05-11 07:23:58
201.184.68.58 attack
May 10 15:12:41: Invalid user travel from 201.184.68.58 port 32834
2020-05-11 07:27:16
183.234.11.43 attack
Brute-force attempt banned
2020-05-11 06:57:52
52.80.135.74 attackbotsspam
Invalid user service from 52.80.135.74 port 41712
2020-05-11 07:11:52
165.227.66.224 attackbots
$f2bV_matches
2020-05-11 07:18:30
132.232.21.72 attackbots
May 11 01:03:45 buvik sshd[12507]: Failed password for invalid user sinusbot from 132.232.21.72 port 51114 ssh2
May 11 01:08:58 buvik sshd[13325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.21.72  user=mail
May 11 01:09:00 buvik sshd[13325]: Failed password for mail from 132.232.21.72 port 55585 ssh2
...
2020-05-11 07:13:56
203.75.181.53 attackspambots
SSH Brute Force
2020-05-11 07:26:53
121.69.44.6 attackbotsspam
Invalid user auditor from 121.69.44.6 port 51542
2020-05-11 07:20:44
218.94.23.132 attackbots
Invalid user admin from 218.94.23.132 port 45670
2020-05-11 07:25:24
208.100.26.237 attackbots
Scan ports
2020-05-11 06:59:05
106.12.108.170 attackbotsspam
May 11 03:35:55 gw1 sshd[25318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.170
May 11 03:35:57 gw1 sshd[25318]: Failed password for invalid user job from 106.12.108.170 port 53204 ssh2
...
2020-05-11 06:57:22
192.144.218.143 attackbotsspam
May 10 22:27:51 ns382633 sshd\[24561\]: Invalid user xiao from 192.144.218.143 port 39678
May 10 22:27:51 ns382633 sshd\[24561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.143
May 10 22:27:54 ns382633 sshd\[24561\]: Failed password for invalid user xiao from 192.144.218.143 port 39678 ssh2
May 10 22:34:10 ns382633 sshd\[25671\]: Invalid user agarwal from 192.144.218.143 port 45522
May 10 22:34:10 ns382633 sshd\[25671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.143
2020-05-11 07:17:16
185.153.196.230 attackbots
May 11 02:01:06 server2 sshd\[4527\]: Invalid user 0 from 185.153.196.230
May 11 02:01:06 server2 sshd\[4526\]: Invalid user 0 from 185.153.196.230
May 11 02:01:06 server2 sshd\[4525\]: Invalid user 0 from 185.153.196.230
May 11 02:01:09 server2 sshd\[4532\]: Invalid user 22 from 185.153.196.230
May 11 02:01:10 server2 sshd\[4533\]: Invalid user 22 from 185.153.196.230
May 11 02:01:11 server2 sshd\[4531\]: Invalid user 22 from 185.153.196.230
2020-05-11 07:10:00
163.172.121.98 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-05-11 07:31:38
123.138.18.35 attack
May 10 23:27:15 vps639187 sshd\[30019\]: Invalid user admin from 123.138.18.35 port 40165
May 10 23:27:15 vps639187 sshd\[30019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.35
May 10 23:27:17 vps639187 sshd\[30019\]: Failed password for invalid user admin from 123.138.18.35 port 40165 ssh2
...
2020-05-11 07:20:07

Recently Reported IPs

253.3.228.155 145.128.191.94 163.221.252.48 129.211.17.22
82.251.79.234 35.118.43.15 186.140.96.78 94.25.168.149
86.87.215.219 209.3.83.180 124.163.212.124 114.222.186.154
159.86.80.64 5.135.177.168 40.92.67.49 235.37.145.94
40.92.4.71 116.255.190.144 186.119.45.72 29.117.250.62