Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.253.55.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5804
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.253.55.109.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 02:47:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 109.55.253.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.55.253.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.254.8.192 attackbots
Invalid user azureuser from 52.254.8.192 port 9843
2020-09-24 15:06:38
177.200.219.170 attackbotsspam
Unauthorized connection attempt from IP address 177.200.219.170 on Port 445(SMB)
2020-09-24 15:17:05
200.132.25.93 attackspambots
Unauthorized connection attempt from IP address 200.132.25.93 on Port 445(SMB)
2020-09-24 15:11:02
87.145.222.6 attackbotsspam
Email rejected due to spam filtering
2020-09-24 15:30:18
170.245.118.29 attackbotsspam
Email rejected due to spam filtering
2020-09-24 15:29:29
160.153.156.137 attack
Automatic report - Banned IP Access
2020-09-24 15:34:41
192.241.154.168 attackspambots
Brute%20Force%20SSH
2020-09-24 15:37:23
52.142.195.37 attack
(sshd) Failed SSH login from 52.142.195.37 (NL/Netherlands/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 02:54:12 jbs1 sshd[10501]: Invalid user vmadmin from 52.142.195.37
Sep 24 02:54:12 jbs1 sshd[10510]: Invalid user vmadmin from 52.142.195.37
Sep 24 02:54:12 jbs1 sshd[10498]: Invalid user vmadmin from 52.142.195.37
Sep 24 02:54:12 jbs1 sshd[10507]: Invalid user vmadmin from 52.142.195.37
Sep 24 02:54:12 jbs1 sshd[10518]: Invalid user vmadmin from 52.142.195.37
2020-09-24 15:04:43
40.87.100.151 attack
<6 unauthorized SSH connections
2020-09-24 15:19:06
178.62.6.215 attack
Automatic report - Banned IP Access
2020-09-24 15:43:55
212.70.149.68 attackbots
Sep 24 09:30:45 mx postfix/smtps/smtpd\[27823\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 24 09:30:50 mx postfix/smtps/smtpd\[27823\]: lost connection after AUTH from unknown\[212.70.149.68\]
Sep 24 09:32:44 mx postfix/smtps/smtpd\[27823\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 24 09:32:49 mx postfix/smtps/smtpd\[27823\]: lost connection after AUTH from unknown\[212.70.149.68\]
Sep 24 09:34:42 mx postfix/smtps/smtpd\[27823\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-24 15:41:45
183.82.115.127 attack
Unauthorized connection attempt from IP address 183.82.115.127 on Port 445(SMB)
2020-09-24 15:40:19
170.130.187.6 attackbotsspam
 TCP (SYN) 170.130.187.6:54156 -> port 3389, len 44
2020-09-24 15:34:11
173.44.175.45 attack
173.44.175.45 has been banned for [spam]
...
2020-09-24 15:26:34
119.114.99.138 attack
Bruteforce detected by fail2ban
2020-09-24 15:23:26

Recently Reported IPs

171.234.39.220 173.74.23.71 35.103.75.162 233.198.231.227
119.156.228.235 252.20.158.34 73.31.232.163 31.251.233.204
19.73.247.143 59.43.37.170 50.139.252.228 169.122.32.59
196.158.160.220 165.21.87.244 74.136.93.203 44.130.146.97
169.112.132.145 209.62.109.168 245.168.93.229 26.57.99.254