Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.55.249.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.55.249.112.			IN	A

;; AUTHORITY SECTION:
.			277	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:00:31 CST 2022
;; MSG SIZE  rcvd: 107
Host info
112.249.55.198.in-addr.arpa domain name pointer static-ip-198-55-249-112.net-198-55-249-0.rdns.managed.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
112.249.55.198.in-addr.arpa	name = static-ip-198-55-249-112.net-198-55-249-0.rdns.managed.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.163.109.153 attackbotsspam
Spam blog comment in WordPress, from "em7evg@gmail.com", about gaming
2020-09-20 19:46:58
70.45.133.188 attackbots
Sep 20 10:23:56 * sshd[1955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.45.133.188
Sep 20 10:23:58 * sshd[1955]: Failed password for invalid user admin from 70.45.133.188 port 53444 ssh2
2020-09-20 19:48:16
165.22.69.147 attack
$f2bV_matches
2020-09-20 19:46:04
218.249.73.54 attackbots
$f2bV_matches
2020-09-20 20:06:33
184.105.247.196 attack
 TCP (SYN) 184.105.247.196:46723 -> port 11211, len 44
2020-09-20 20:04:10
38.21.240.216 attackbots
Sep 20 11:09:42 rancher-0 sshd[164896]: Invalid user mats from 38.21.240.216 port 55290
Sep 20 11:09:45 rancher-0 sshd[164896]: Failed password for invalid user mats from 38.21.240.216 port 55290 ssh2
...
2020-09-20 20:01:22
185.220.101.211 attack
fail2ban detected bruce force on ssh iptables
2020-09-20 19:43:11
167.71.36.101 attackspam
*Port Scan* detected from 167.71.36.101 (DE/Germany/North Rhine-Westphalia/Gremberghoven/minasa.tech). 4 hits in the last 281 seconds
2020-09-20 19:50:25
159.89.163.226 attackbots
Invalid user oracle from 159.89.163.226 port 55498
2020-09-20 19:43:57
184.105.247.219 attackbots
firewall-block, port(s): 5353/udp
2020-09-20 19:31:19
216.218.206.107 attackbotsspam
srv02 Mass scanning activity detected Target: 111(sunrpc) ..
2020-09-20 19:51:53
116.27.175.103 attack
[portscan] Port scan
2020-09-20 20:07:52
41.66.24.247 attackbotsspam
20/9/19@12:58:05: FAIL: Alarm-Intrusion address from=41.66.24.247
...
2020-09-20 19:30:29
104.140.188.18 attackspam
Found on   Alienvault    / proto=6  .  srcport=62155  .  dstport=23  .     (3469)
2020-09-20 19:55:14
46.146.222.134 attackbots
Sep 20 13:50:49 pve1 sshd[2803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.222.134 
Sep 20 13:50:50 pve1 sshd[2803]: Failed password for invalid user test from 46.146.222.134 port 52558 ssh2
...
2020-09-20 19:54:03

Recently Reported IPs

198.55.248.46 198.55.248.13 198.55.254.91 198.55.248.73
198.55.30.235 198.55.60.13 198.55.30.2 198.55.51.165
198.57.131.24 198.55.42.16 198.55.51.50 198.57.148.156
198.55.49.163 198.57.14.102 198.55.55.220 198.57.148.208
198.57.149.212 198.57.149.17 198.57.149.38 198.57.149.31