Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: Safaricom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.104.55.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13776
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.104.55.28.			IN	A

;; AUTHORITY SECTION:
.			387	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040501 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 07:20:10 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 28.55.104.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.55.104.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.144.103.166 attackspam
445/tcp
[2019-08-09]1pkt
2019-08-09 20:05:06
218.92.0.196 attack
Aug  9 12:04:50 game-panel sshd[30771]: Failed password for root from 218.92.0.196 port 13701 ssh2
Aug  9 12:06:39 game-panel sshd[30829]: Failed password for root from 218.92.0.196 port 52048 ssh2
2019-08-09 20:17:23
171.5.30.113 attackbots
445/tcp
[2019-08-09]1pkt
2019-08-09 19:41:56
66.249.79.126 attack
Automatic report - Banned IP Access
2019-08-09 19:49:51
207.244.70.35 attackspambots
Aug  9 18:22:06 lcl-usvr-01 sshd[29932]: Invalid user admin from 207.244.70.35
Aug  9 18:22:06 lcl-usvr-01 sshd[29932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.244.70.35 
Aug  9 18:22:06 lcl-usvr-01 sshd[29932]: Invalid user admin from 207.244.70.35
Aug  9 18:22:07 lcl-usvr-01 sshd[29932]: Failed password for invalid user admin from 207.244.70.35 port 43488 ssh2
Aug  9 18:22:06 lcl-usvr-01 sshd[29932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.244.70.35 
Aug  9 18:22:06 lcl-usvr-01 sshd[29932]: Invalid user admin from 207.244.70.35
Aug  9 18:22:07 lcl-usvr-01 sshd[29932]: Failed password for invalid user admin from 207.244.70.35 port 43488 ssh2
Aug  9 18:22:10 lcl-usvr-01 sshd[29932]: Failed password for invalid user admin from 207.244.70.35 port 43488 ssh2
2019-08-09 20:14:50
112.213.104.1 attack
xmlrpc attack
2019-08-09 20:20:09
37.49.227.12 attackspam
08/09/2019-06:12:45.435210 37.49.227.12 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 35
2019-08-09 19:37:51
43.227.66.153 attackbots
Aug  9 14:27:36 www sshd\[126559\]: Invalid user rosa from 43.227.66.153
Aug  9 14:27:36 www sshd\[126559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.66.153
Aug  9 14:27:37 www sshd\[126559\]: Failed password for invalid user rosa from 43.227.66.153 port 39216 ssh2
...
2019-08-09 19:44:26
107.180.123.15 attackbotsspam
xmlrpc attack
2019-08-09 19:36:43
72.52.245.122 attackbots
xmlrpc attack
2019-08-09 20:20:56
218.92.0.145 attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-08-09 20:08:52
160.153.147.136 attackbotsspam
xmlrpc attack
2019-08-09 20:07:18
95.10.27.239 attack
22/tcp
[2019-08-09]1pkt
2019-08-09 19:51:26
151.225.207.19 attackspambots
23/tcp
[2019-08-09]1pkt
2019-08-09 20:02:38
176.31.172.40 attack
Automatic report - Banned IP Access
2019-08-09 20:15:26

Recently Reported IPs

134.122.96.154 153.165.36.163 128.106.173.122 173.130.202.82
36.235.234.244 218.157.140.211 141.153.110.44 173.65.169.219
82.199.10.219 151.240.191.228 12.182.112.61 186.150.242.151
2.107.209.68 39.184.217.212 162.196.53.154 116.4.54.137
119.243.82.150 120.200.235.158 201.6.185.60 79.119.50.66