Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei City

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: Digital United Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.104.64.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49623
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;112.104.64.55.			IN	A

;; AUTHORITY SECTION:
.			2597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 07:44:51 CST 2019
;; MSG SIZE  rcvd: 117

Host info
55.64.104.112.in-addr.arpa domain name pointer 112-104-64-55.adsl.dynamic.seed.net.tw.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
55.64.104.112.in-addr.arpa	name = 112-104-64-55.adsl.dynamic.seed.net.tw.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
182.119.238.116 attackspambots
Automatic report - Port Scan Attack
2019-07-14 10:10:39
51.255.83.178 attack
Jul 14 03:30:05 mail sshd\[7438\]: Invalid user postgres from 51.255.83.178 port 48008
Jul 14 03:30:05 mail sshd\[7438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.83.178
...
2019-07-14 10:34:19
218.189.15.99 attackbots
SMB Server BruteForce Attack
2019-07-14 10:27:19
27.122.56.35 attackbots
14.07.2019 01:50:14 SSH access blocked by firewall
2019-07-14 09:56:23
36.80.34.10 attackbots
firewall-block, port(s): 139/tcp
2019-07-14 10:32:11
196.218.146.91 attackspambots
Automatic report - Port Scan Attack
2019-07-14 10:32:32
91.221.177.12 attack
[portscan] Port scan
2019-07-14 10:25:25
114.104.158.172 attack
Jul 14 02:40:33 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:114.104.158.172\]
...
2019-07-14 10:04:09
197.53.55.173 attackbotsspam
firewall-block, port(s): 23/tcp
2019-07-14 10:09:21
188.36.142.244 attackspambots
Automatic report - Port Scan Attack
2019-07-14 10:07:31
183.63.87.235 attackspambots
Jul 14 01:49:30 ip-172-31-1-72 sshd\[11321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.63.87.235  user=root
Jul 14 01:49:32 ip-172-31-1-72 sshd\[11321\]: Failed password for root from 183.63.87.235 port 40732 ssh2
Jul 14 01:52:19 ip-172-31-1-72 sshd\[11333\]: Invalid user cba from 183.63.87.235
Jul 14 01:52:19 ip-172-31-1-72 sshd\[11333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.63.87.235
Jul 14 01:52:21 ip-172-31-1-72 sshd\[11333\]: Failed password for invalid user cba from 183.63.87.235 port 41774 ssh2
2019-07-14 09:58:58
177.52.71.137 attackspam
firewall-block, port(s): 445/tcp
2019-07-14 10:18:14
82.207.119.200 attack
SPF Fail sender not permitted to send mail for @ukrtel.net / Spam to target mail address hacked/leaked/bought from Kachingle
2019-07-14 10:16:51
159.65.123.104 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-14 10:07:47
221.181.24.246 attackbotsspam
2019-07-13 UTC: 1x - root
2019-07-14 09:56:40

Recently Reported IPs

52.23.43.135 180.250.87.210 104.119.239.172 46.8.192.247
37.135.168.25 70.66.2.237 58.42.32.161 119.98.43.135
187.157.45.227 166.147.217.185 37.167.216.88 66.220.155.155
100.189.137.190 189.169.135.58 189.40.33.222 46.246.65.134
217.17.98.93 42.188.92.151 63.96.187.205 65.156.20.125