Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.109.132.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34455
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.109.132.55.			IN	A

;; AUTHORITY SECTION:
.			18	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 17:04:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
55.132.109.109.in-addr.arpa domain name pointer biografia.uk.plesk-server.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.132.109.109.in-addr.arpa	name = biografia.uk.plesk-server.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.213.132.243 attackbotsspam
Unauthorized connection attempt detected from IP address 186.213.132.243 to port 445
2019-12-26 00:28:36
151.80.254.78 attackspambots
Dec 25 15:55:50 herz-der-gamer sshd[16701]: Invalid user oracle from 151.80.254.78 port 42524
Dec 25 15:55:50 herz-der-gamer sshd[16701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.78
Dec 25 15:55:50 herz-der-gamer sshd[16701]: Invalid user oracle from 151.80.254.78 port 42524
Dec 25 15:55:52 herz-der-gamer sshd[16701]: Failed password for invalid user oracle from 151.80.254.78 port 42524 ssh2
...
2019-12-26 00:06:37
103.106.77.188 attack
1577285744 - 12/25/2019 15:55:44 Host: 103.106.77.188/103.106.77.188 Port: 445 TCP Blocked
2019-12-26 00:12:38
222.186.175.140 attackspambots
Dec 25 17:24:51 markkoudstaal sshd[17470]: Failed password for root from 222.186.175.140 port 10618 ssh2
Dec 25 17:25:05 markkoudstaal sshd[17470]: error: maximum authentication attempts exceeded for root from 222.186.175.140 port 10618 ssh2 [preauth]
Dec 25 17:25:11 markkoudstaal sshd[17494]: Failed password for root from 222.186.175.140 port 28774 ssh2
2019-12-26 00:25:41
49.88.112.67 attackbots
Dec 25 11:03:19 linuxvps sshd\[12507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
Dec 25 11:03:21 linuxvps sshd\[12507\]: Failed password for root from 49.88.112.67 port 23820 ssh2
Dec 25 11:06:47 linuxvps sshd\[14617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
Dec 25 11:06:48 linuxvps sshd\[14617\]: Failed password for root from 49.88.112.67 port 42495 ssh2
Dec 25 11:09:00 linuxvps sshd\[15940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
2019-12-26 00:33:25
222.186.190.2 attackspam
Dec 25 16:50:47 h2177944 sshd\[16450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Dec 25 16:50:49 h2177944 sshd\[16450\]: Failed password for root from 222.186.190.2 port 35552 ssh2
Dec 25 16:50:54 h2177944 sshd\[16450\]: Failed password for root from 222.186.190.2 port 35552 ssh2
Dec 25 16:50:57 h2177944 sshd\[16450\]: Failed password for root from 222.186.190.2 port 35552 ssh2
...
2019-12-26 00:12:23
189.144.75.56 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-12-26 00:26:43
106.53.4.161 attack
Automatic report - SSH Brute-Force Attack
2019-12-26 00:13:13
34.67.184.22 attackspambots
Automatic report - XMLRPC Attack
2019-12-26 00:25:18
165.22.31.24 attack
C1,WP GET /manga/wp-login.php
2019-12-26 00:19:00
89.22.55.46 attackspam
Dec 25 04:45:37 web9 sshd\[13015\]: Invalid user iimura from 89.22.55.46
Dec 25 04:45:37 web9 sshd\[13015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.55.46
Dec 25 04:45:39 web9 sshd\[13015\]: Failed password for invalid user iimura from 89.22.55.46 port 45868 ssh2
Dec 25 04:55:27 web9 sshd\[14398\]: Invalid user testasd from 89.22.55.46
Dec 25 04:55:27 web9 sshd\[14398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.55.46
2019-12-26 00:23:32
213.147.113.131 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-26 00:10:52
103.81.156.8 attack
2019-12-25T15:33:52.958121shield sshd\[20255\]: Invalid user ljiljana from 103.81.156.8 port 55690
2019-12-25T15:33:52.964462shield sshd\[20255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.156.8
2019-12-25T15:33:55.320609shield sshd\[20255\]: Failed password for invalid user ljiljana from 103.81.156.8 port 55690 ssh2
2019-12-25T15:36:40.397297shield sshd\[21676\]: Invalid user mp3 from 103.81.156.8 port 46562
2019-12-25T15:36:40.402815shield sshd\[21676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.156.8
2019-12-25 23:51:57
108.160.199.223 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-12-26 00:14:02
187.189.11.49 attack
Dec 25 16:41:31 dedicated sshd[5799]: Invalid user xerox from 187.189.11.49 port 48688
2019-12-26 00:13:39

Recently Reported IPs

109.109.215.18 109.109.229.85 109.109.33.156 109.109.36.6
109.109.38.172 109.109.38.191 109.109.36.58 109.109.36.60
109.109.43.187 109.109.42.63 109.109.38.155 109.109.47.4
109.109.44.106 109.109.47.113 109.109.38.178 109.109.47.49
109.109.56.1 109.109.54.68 109.109.56.183 109.109.57.149