Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.224.250.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3786
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.224.250.55.			IN	A

;; AUTHORITY SECTION:
.			555	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:57:43 CST 2022
;; MSG SIZE  rcvd: 107
Host info
55.250.224.131.in-addr.arpa domain name pointer sub.gezondeschool.nl.
55.250.224.131.in-addr.arpa domain name pointer www.gezondeschool.nl.
55.250.224.131.in-addr.arpa domain name pointer gezondeschool.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.250.224.131.in-addr.arpa	name = sub.gezondeschool.nl.
55.250.224.131.in-addr.arpa	name = www.gezondeschool.nl.
55.250.224.131.in-addr.arpa	name = gezondeschool.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.77.56.215 attack
Port probing on unauthorized port 445
2020-09-01 02:16:53
106.12.69.250 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-01 02:35:55
69.164.221.39 attack
 TCP (SYN) 69.164.221.39:39932 -> port 80, len 40
2020-09-01 02:34:14
121.23.143.135 attackspambots
Unauthorised access (Aug 31) SRC=121.23.143.135 LEN=40 TTL=46 ID=20862 TCP DPT=8080 WINDOW=46483 SYN 
Unauthorised access (Aug 31) SRC=121.23.143.135 LEN=40 TTL=46 ID=39006 TCP DPT=8080 WINDOW=46483 SYN 
Unauthorised access (Aug 30) SRC=121.23.143.135 LEN=40 TTL=45 ID=32148 TCP DPT=8080 WINDOW=46483 SYN 
Unauthorised access (Aug 30) SRC=121.23.143.135 LEN=40 TTL=46 ID=47219 TCP DPT=8080 WINDOW=46483 SYN
2020-09-01 02:40:32
97.107.141.72 attack
 TCP (SYN) 97.107.141.72:34392 -> port 80, len 44
2020-09-01 02:21:29
74.102.28.162 attack
 TCP (SYN) 74.102.28.162:27997 -> port 23, len 40
2020-09-01 02:47:33
176.107.131.9 attackbots
fail2ban/Aug 31 17:35:04 h1962932 sshd[21957]: Invalid user wxl from 176.107.131.9 port 36366
Aug 31 17:35:04 h1962932 sshd[21957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.107.131.9
Aug 31 17:35:04 h1962932 sshd[21957]: Invalid user wxl from 176.107.131.9 port 36366
Aug 31 17:35:06 h1962932 sshd[21957]: Failed password for invalid user wxl from 176.107.131.9 port 36366 ssh2
Aug 31 17:42:06 h1962932 sshd[22106]: Invalid user minecraft from 176.107.131.9 port 44664
2020-09-01 02:48:25
3.14.7.109 attack
mue-0 : Trying access unauthorized files=>/images/jdownloads/screenshots/update.php()
2020-09-01 02:26:16
106.51.50.110 attackspam
Unauthorized connection attempt from IP address 106.51.50.110 on Port 445(SMB)
2020-09-01 02:24:17
47.31.59.243 attack
Unauthorized connection attempt from IP address 47.31.59.243 on Port 445(SMB)
2020-09-01 02:38:17
203.205.37.233 attackspambots
"Unauthorized connection attempt on SSHD detected"
2020-09-01 02:32:17
109.217.139.61 attack
109.217.139.61 - - [31/Aug/2020:13:46:27 -0400] "POST /xmlrpc.php HTTP/1.1" 404 208 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1468.0 Safari/537.36"
109.217.139.61 - - [31/Aug/2020:13:46:42 -0400] "POST /wordpress/xmlrpc.php HTTP/1.1" 404 218 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1468.0 Safari/537.36"
109.217.139.61 - - [31/Aug/2020:13:46:43 -0400] "POST /blog/xmlrpc.php HTTP/1.1" 404 213 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1468.0 Safari/537.36"
...
2020-09-01 02:09:47
49.232.191.230 attack
5332/tcp
[2020-08-31]1pkt
2020-09-01 02:46:31
5.189.175.63 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: vmi433097.contaboserver.net.
2020-09-01 02:29:57
223.238.199.169 attackbots
Unauthorized connection attempt from IP address 223.238.199.169 on Port 445(SMB)
2020-09-01 02:45:14

Recently Reported IPs

131.239.17.58 131.226.193.90 131.224.250.82 131.224.245.85
131.226.5.14 104.21.92.113 77.160.30.65 131.72.236.93
131.72.236.123 131.72.237.10 131.224.244.92 131.255.32.213
131.72.217.107 104.21.92.131 131.72.222.88 131.72.236.148
131.72.217.133 198.176.193.87 131.72.236.184 131.72.30.210