Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.208.55.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14607
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.208.55.10.			IN	A

;; AUTHORITY SECTION:
.			348	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 296 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:01:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 10.55.208.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 10.55.208.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.190.252.87 attackspambots
113.190.252.87 - - [01/Jun/2020:05:49:15 +0200] "GET /wp-login.php HTTP/1.1" 200 6614 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
113.190.252.87 - - [01/Jun/2020:05:49:17 +0200] "POST /wp-login.php HTTP/1.1" 200 6865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
113.190.252.87 - - [01/Jun/2020:05:49:19 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-01 16:23:50
132.232.63.133 attackspambots
May 31 18:16:57 Tower sshd[3985]: refused connect from 117.91.186.55 (117.91.186.55)
Jun  1 02:12:45 Tower sshd[3985]: Connection from 132.232.63.133 port 41736 on 192.168.10.220 port 22 rdomain ""
Jun  1 02:12:47 Tower sshd[3985]: Failed password for root from 132.232.63.133 port 41736 ssh2
Jun  1 02:12:48 Tower sshd[3985]: Received disconnect from 132.232.63.133 port 41736:11: Bye Bye [preauth]
Jun  1 02:12:48 Tower sshd[3985]: Disconnected from authenticating user root 132.232.63.133 port 41736 [preauth]
2020-06-01 16:00:10
190.89.28.45 attackbotsspam
Jun  1 07:55:42 piServer sshd[3187]: Failed password for root from 190.89.28.45 port 36272 ssh2
Jun  1 07:58:24 piServer sshd[3381]: Failed password for root from 190.89.28.45 port 47376 ssh2
...
2020-06-01 16:12:16
198.108.66.152 attackbots
Port Scan detected!
...
2020-06-01 15:52:27
183.157.171.229 attackbots
1590983407 - 06/01/2020 10:50:07 Host: 183.157.171.229/183.157.171.229 Port: 23 TCP Blocked
...
2020-06-01 15:49:15
165.227.211.13 attackspambots
2020-06-01T04:49:57.138137shield sshd\[4829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.211.13  user=root
2020-06-01T04:49:59.131886shield sshd\[4829\]: Failed password for root from 165.227.211.13 port 59098 ssh2
2020-06-01T04:54:37.944087shield sshd\[5971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.211.13  user=root
2020-06-01T04:54:39.374317shield sshd\[5971\]: Failed password for root from 165.227.211.13 port 49958 ssh2
2020-06-01T04:58:48.807856shield sshd\[7102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.211.13  user=root
2020-06-01 16:29:40
49.235.217.169 attack
Jun  1 03:47:29 ip-172-31-61-156 sshd[3408]: Failed password for root from 49.235.217.169 port 35684 ssh2
Jun  1 03:49:51 ip-172-31-61-156 sshd[3492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.217.169  user=root
Jun  1 03:49:53 ip-172-31-61-156 sshd[3492]: Failed password for root from 49.235.217.169 port 42658 ssh2
Jun  1 03:49:51 ip-172-31-61-156 sshd[3492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.217.169  user=root
Jun  1 03:49:53 ip-172-31-61-156 sshd[3492]: Failed password for root from 49.235.217.169 port 42658 ssh2
...
2020-06-01 15:59:22
192.34.63.128 attackspambots
Jun  1 05:46:00 jane sshd[24700]: Failed password for root from 192.34.63.128 port 38350 ssh2
...
2020-06-01 16:18:19
104.193.128.114 attackspam
Jun  1 08:44:58  sshd\[2254\]: User root from 104.193.128.114 not allowed because not listed in AllowUsersJun  1 08:45:00  sshd\[2254\]: Failed password for invalid user root from 104.193.128.114 port 57142 ssh2
...
2020-06-01 15:57:39
119.29.41.117 attackbots
2020-05-31 16:46:41 server sshd[70758]: Failed password for invalid user root from 119.29.41.117 port 32786 ssh2
2020-06-01 16:22:43
34.229.38.226 attack
20/5/31@23:49:13: FAIL: Alarm-Intrusion address from=34.229.38.226
...
2020-06-01 16:31:19
106.12.89.154 attackspam
Jun  1 01:38:19 server1 sshd\[19049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.154  user=root
Jun  1 01:38:20 server1 sshd\[19049\]: Failed password for root from 106.12.89.154 port 34382 ssh2
Jun  1 01:42:11 server1 sshd\[20202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.154  user=root
Jun  1 01:42:13 server1 sshd\[20202\]: Failed password for root from 106.12.89.154 port 56458 ssh2
Jun  1 01:46:20 server1 sshd\[21504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.154  user=root
...
2020-06-01 15:53:22
189.186.12.111 attackbots
20 attempts against mh-ssh on boat
2020-06-01 15:51:32
138.68.75.113 attackspambots
SSH login attempts.
2020-06-01 16:30:20
31.129.173.162 attackbotsspam
SSH bruteforce
2020-06-01 16:00:50

Recently Reported IPs

116.208.54.91 116.208.55.111 116.208.55.106 116.208.55.100
116.208.55.103 116.208.55.105 116.208.55.117 116.208.55.152
116.208.55.163 114.105.183.68 116.208.55.133 116.208.55.17
116.208.55.173 116.208.55.174 116.208.55.178 116.208.55.203
116.208.55.197 116.208.55.201 116.208.55.198 116.208.55.214