Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.55.106.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.55.106.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 21:47:43 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 44.106.55.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.106.55.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.131.140.115 attackspambots
$f2bV_matches
2019-08-27 14:11:33
13.66.192.66 attackbotsspam
[Aegis] @ 2019-08-27 06:38:59  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-08-27 14:29:06
182.61.33.47 attackbotsspam
$f2bV_matches
2019-08-27 14:26:26
163.172.13.168 attack
Aug 26 19:56:41 TORMINT sshd\[24860\]: Invalid user castis from 163.172.13.168
Aug 26 19:56:41 TORMINT sshd\[24860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.13.168
Aug 26 19:56:43 TORMINT sshd\[24860\]: Failed password for invalid user castis from 163.172.13.168 port 33757 ssh2
...
2019-08-27 14:44:49
124.149.253.83 attackbotsspam
Aug 27 04:01:09 ks10 sshd[29535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.149.253.83 
Aug 27 04:01:12 ks10 sshd[29535]: Failed password for invalid user test9 from 124.149.253.83 port 35652 ssh2
...
2019-08-27 14:27:33
133.242.228.107 attackspambots
Automated report - ssh fail2ban:
Aug 27 04:50:49 authentication failure 
Aug 27 04:50:51 wrong password, user=developer, port=36742, ssh2
Aug 27 04:55:37 authentication failure
2019-08-27 13:52:37
223.243.29.102 attackbots
Aug 27 03:31:15 plex sshd[8161]: Invalid user pritesh from 223.243.29.102 port 52246
2019-08-27 14:31:19
83.143.246.2 attackbotsspam
Aug 26 13:34:59 auw2 sshd\[1167\]: Invalid user no from 83.143.246.2
Aug 26 13:34:59 auw2 sshd\[1167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.143.246.2
Aug 26 13:35:01 auw2 sshd\[1167\]: Failed password for invalid user no from 83.143.246.2 port 22558 ssh2
Aug 26 13:35:04 auw2 sshd\[1185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.143.246.2  user=root
Aug 26 13:35:06 auw2 sshd\[1185\]: Failed password for root from 83.143.246.2 port 26334 ssh2
2019-08-27 13:50:56
41.39.130.22 attack
19/8/26@19:34:47: FAIL: Alarm-Intrusion address from=41.39.130.22
19/8/26@19:34:47: FAIL: Alarm-Intrusion address from=41.39.130.22
...
2019-08-27 14:06:35
82.202.226.147 attack
Malicious brute force vulnerability hacking attacks
2019-08-27 14:39:34
121.8.142.250 attackspambots
Invalid user felicia from 121.8.142.250 port 48218
2019-08-27 13:55:53
217.112.128.197 attack
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-08-27 14:46:58
109.73.180.220 attackspambots
Automatic report - Port Scan Attack
2019-08-27 14:19:36
62.102.148.69 attackbots
Aug 27 06:44:25 MK-Soft-VM5 sshd\[4641\]: Invalid user ftp from 62.102.148.69 port 38157
Aug 27 06:44:25 MK-Soft-VM5 sshd\[4641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.102.148.69
Aug 27 06:44:27 MK-Soft-VM5 sshd\[4641\]: Failed password for invalid user ftp from 62.102.148.69 port 38157 ssh2
...
2019-08-27 14:45:11
162.214.14.226 attack
[munged]::443 162.214.14.226 - - [27/Aug/2019:04:08:18 +0200] "POST /[munged]: HTTP/1.1" 200 7447 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.214.14.226 - - [27/Aug/2019:04:08:24 +0200] "POST /[munged]: HTTP/1.1" 200 7449 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-27 14:40:10

Recently Reported IPs

215.66.246.105 19.153.169.95 129.176.210.233 55.71.64.251
156.48.23.45 4.51.158.102 129.143.134.196 227.71.253.200
26.41.166.103 71.9.131.106 242.9.12.214 248.153.173.239
14.55.7.34 40.191.74.81 174.91.102.194 18.253.44.101
47.247.81.179 247.127.131.11 38.136.210.194 88.180.21.144