Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.252.55.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.252.55.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 03:55:40 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 28.55.252.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.55.252.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.188.167 attack
*Port Scan* detected from 159.89.188.167 (US/United States/-). 4 hits in the last 120 seconds
2019-10-08 21:52:50
14.141.199.166 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 08-10-2019 12:55:23.
2019-10-08 21:37:05
52.172.138.31 attackbots
Oct  8 14:52:58 markkoudstaal sshd[27073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.138.31
Oct  8 14:53:00 markkoudstaal sshd[27073]: Failed password for invalid user Root from 52.172.138.31 port 57634 ssh2
Oct  8 14:58:19 markkoudstaal sshd[27501]: Failed password for root from 52.172.138.31 port 44448 ssh2
2019-10-08 21:59:11
201.16.129.123 attackbotsspam
Automatic report - Port Scan Attack
2019-10-08 21:50:00
92.242.240.17 attackspambots
Oct  8 14:37:23 xeon sshd[48839]: Failed password for root from 92.242.240.17 port 60764 ssh2
2019-10-08 21:33:43
14.18.93.114 attackspam
Oct  8 15:56:55 www sshd\[75000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.93.114  user=root
Oct  8 15:56:57 www sshd\[75000\]: Failed password for root from 14.18.93.114 port 43242 ssh2
Oct  8 16:02:37 www sshd\[75028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.93.114  user=root
...
2019-10-08 21:18:11
195.68.206.250 attack
10/08/2019-15:37:35.060879 195.68.206.250 Protocol: 6 ET CHAT IRC PING command
2019-10-08 21:48:06
51.68.136.168 attack
2019-10-08T13:34:02.191295abusebot.cloudsearch.cf sshd\[18752\]: Invalid user 7m6n5b4v3c2x1z from 51.68.136.168 port 51222
2019-10-08 21:58:35
62.90.85.225 attackspambots
scan z
2019-10-08 21:17:25
54.38.241.162 attack
Oct  8 09:26:46 ny01 sshd[21678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.241.162
Oct  8 09:26:48 ny01 sshd[21678]: Failed password for invalid user 123Photo from 54.38.241.162 port 52376 ssh2
Oct  8 09:35:02 ny01 sshd[22528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.241.162
2019-10-08 21:50:57
51.68.97.191 attackspam
Oct  8 15:47:02 SilenceServices sshd[4198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.97.191
Oct  8 15:47:05 SilenceServices sshd[4198]: Failed password for invalid user Welcome@123 from 51.68.97.191 port 44582 ssh2
Oct  8 15:51:36 SilenceServices sshd[5760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.97.191
2019-10-08 21:55:05
157.230.27.47 attackbotsspam
Oct  8 03:44:15 auw2 sshd\[8261\]: Invalid user Spanish@2017 from 157.230.27.47
Oct  8 03:44:15 auw2 sshd\[8261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.27.47
Oct  8 03:44:17 auw2 sshd\[8261\]: Failed password for invalid user Spanish@2017 from 157.230.27.47 port 52362 ssh2
Oct  8 03:48:26 auw2 sshd\[8610\]: Invalid user Maya@2017 from 157.230.27.47
Oct  8 03:48:26 auw2 sshd\[8610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.27.47
2019-10-08 21:58:12
92.154.51.236 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 08-10-2019 12:55:28.
2019-10-08 21:27:11
118.89.35.251 attackbotsspam
Oct  8 03:19:13 eddieflores sshd\[19816\]: Invalid user 123@123 from 118.89.35.251
Oct  8 03:19:13 eddieflores sshd\[19816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.35.251
Oct  8 03:19:14 eddieflores sshd\[19816\]: Failed password for invalid user 123@123 from 118.89.35.251 port 50588 ssh2
Oct  8 03:23:53 eddieflores sshd\[20182\]: Invalid user Parola@2016 from 118.89.35.251
Oct  8 03:23:53 eddieflores sshd\[20182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.35.251
2019-10-08 21:24:29
51.77.140.244 attackbots
Oct  8 15:25:39 vps647732 sshd[9476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.244
Oct  8 15:25:40 vps647732 sshd[9476]: Failed password for invalid user Gustavo123 from 51.77.140.244 port 58778 ssh2
...
2019-10-08 21:41:56

Recently Reported IPs

218.52.111.50 50.133.37.140 246.28.243.104 233.214.148.139
84.188.26.162 192.186.55.211 223.213.217.251 130.174.168.227
166.14.60.127 220.186.223.27 69.113.240.150 251.175.131.243
199.29.150.221 185.170.104.250 145.97.107.92 193.102.71.98
186.51.138.219 6.106.68.51 176.25.48.57 63.209.228.81