Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.169.55.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59567
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.169.55.14.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 09:36:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 14.55.169.109.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.55.169.109.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.65.17.2 attack
Sep  5 16:48:27 sso sshd[21591]: Failed password for root from 77.65.17.2 port 42956 ssh2
...
2020-09-06 03:16:34
185.170.114.25 attack
2020-09-05 11:56:31.202074-0500  localhost sshd[43823]: Failed password for root from 185.170.114.25 port 43147 ssh2
2020-09-06 03:07:45
190.186.19.162 attack
Unauthorized connection attempt from IP address 190.186.19.162 on Port 445(SMB)
2020-09-06 03:40:24
109.94.179.49 attackspam
Attempted connection to port 445.
2020-09-06 03:03:27
14.207.82.167 attack
Attempted connection to port 445.
2020-09-06 03:01:54
188.57.41.169 attackspam
Attempted connection to port 445.
2020-09-06 03:37:23
95.84.240.62 attack
Sep  5 19:58:49 marvibiene sshd[11165]: Failed password for root from 95.84.240.62 port 39282 ssh2
2020-09-06 03:19:51
198.15.246.34 attackbotsspam
Attempted connection to port 10347.
2020-09-06 03:36:09
184.22.193.211 attack
Attempted connection to port 445.
2020-09-06 03:39:15
178.205.253.206 attackbots
 TCP (SYN) 178.205.253.206:55414 -> port 1433, len 44
2020-09-06 03:39:47
211.20.181.113 attackspambots
Attempted Brute Force (dovecot)
2020-09-06 03:29:14
150.109.99.243 attackspam
Sep  5 19:02:25 instance-2 sshd[29677]: Failed password for root from 150.109.99.243 port 49554 ssh2
Sep  5 19:08:12 instance-2 sshd[29933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.99.243 
Sep  5 19:08:14 instance-2 sshd[29933]: Failed password for invalid user admin from 150.109.99.243 port 56728 ssh2
2020-09-06 03:10:19
192.241.220.50 attackbotsspam
TCP ports : 5672 / 29015
2020-09-06 03:14:48
201.234.56.238 attackbotsspam
Unauthorized connection attempt from IP address 201.234.56.238 on Port 445(SMB)
2020-09-06 03:19:26
103.93.181.23 attack
Attempted connection to port 1433.
2020-09-06 03:03:53

Recently Reported IPs

109.169.254.5 109.170.16.134 109.170.133.131 109.170.184.54
109.173.144.231 109.175.102.233 109.18.87.151 109.173.93.119
109.182.224.157 109.175.101.26 109.175.107.124 109.173.188.82
109.184.43.223 109.185.121.87 109.183.158.157 109.184.137.28
109.186.223.141 109.187.162.196 109.187.89.77 109.189.239.240