Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.55.90.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53160
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.55.90.70.			IN	A

;; AUTHORITY SECTION:
.			346	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101501 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 16 02:23:12 CST 2019
;; MSG SIZE  rcvd: 116
Host info
70.90.55.116.IN-ADDR.ARPA domain name pointer 70.90.55.116.broad.km.yn.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.90.55.116.in-addr.arpa	name = 70.90.55.116.broad.km.yn.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
74.82.47.32 attackspam
scan r
2019-08-12 10:53:32
91.187.123.233 attackspambots
445/tcp 445/tcp 445/tcp
[2019-06-12/08-11]3pkt
2019-08-12 10:44:51
118.243.117.67 attack
Aug 12 04:42:32 legacy sshd[15467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.243.117.67
Aug 12 04:42:34 legacy sshd[15467]: Failed password for invalid user steam from 118.243.117.67 port 41768 ssh2
Aug 12 04:47:59 legacy sshd[15550]: Failed password for sshd from 118.243.117.67 port 50782 ssh2
...
2019-08-12 10:53:03
88.35.102.54 attackbots
Aug 12 04:31:28 dedicated sshd[5357]: Invalid user hu from 88.35.102.54 port 49620
2019-08-12 10:32:40
201.219.216.131 attack
proto=tcp  .  spt=38465  .  dpt=25  .     (listed on Blocklist de  Aug 11)     (717)
2019-08-12 10:41:29
185.220.101.26 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.26  user=root
Failed password for root from 185.220.101.26 port 39931 ssh2
Failed password for root from 185.220.101.26 port 39931 ssh2
Failed password for root from 185.220.101.26 port 39931 ssh2
Failed password for root from 185.220.101.26 port 39931 ssh2
2019-08-12 11:07:11
51.68.143.26 attackbotsspam
Aug 12 04:42:57 root sshd[27538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.143.26 
Aug 12 04:42:59 root sshd[27538]: Failed password for invalid user terrariaserver from 51.68.143.26 port 36932 ssh2
Aug 12 04:47:35 root sshd[27569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.143.26 
...
2019-08-12 11:03:09
36.89.247.26 attackspam
Invalid user applmgr from 36.89.247.26 port 59839
2019-08-12 10:25:07
78.187.230.26 attackspam
Automatic report - Port Scan Attack
2019-08-12 10:22:36
190.72.110.195 attackspam
Unauthorized connection attempt from IP address 190.72.110.195 on Port 445(SMB)
2019-08-12 10:28:40
142.44.160.173 attackbots
Aug 11 22:12:02 MK-Soft-VM5 sshd\[27783\]: Invalid user lovemba from 142.44.160.173 port 39546
Aug 11 22:12:02 MK-Soft-VM5 sshd\[27783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.173
Aug 11 22:12:04 MK-Soft-VM5 sshd\[27783\]: Failed password for invalid user lovemba from 142.44.160.173 port 39546 ssh2
...
2019-08-12 10:38:11
220.92.16.94 attackbots
Aug 11 20:00:33 www sshd\[4830\]: Invalid user debora from 220.92.16.94 port 60770
...
2019-08-12 10:29:14
148.70.173.176 attackbotsspam
D-Link DSL-2750B Remote Command Execution Vulnerability
2019-08-12 10:41:51
211.141.179.242 attackspam
Unauthorized connection attempt from IP address 211.141.179.242 on Port 3306(MYSQL)
2019-08-12 10:37:10
180.241.46.165 attackbots
Hit on /xmlrpc.php
2019-08-12 11:05:11

Recently Reported IPs

188.19.181.96 151.228.79.174 188.4.246.83 12.194.221.15
187.44.186.234 12.237.90.33 186.227.59.2 108.100.103.75
197.189.177.188 168.194.107.109 64.23.102.136 134.209.29.183
114.144.153.80 131.100.47.53 177.125.76.111 122.121.93.243
222.132.68.199 100.178.183.71 115.206.97.116 117.204.59.46