Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Eastbourne

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.221.109.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62895
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.221.109.55.			IN	A

;; AUTHORITY SECTION:
.			526	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031202 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 05:58:00 CST 2020
;; MSG SIZE  rcvd: 116
Host info
55.109.221.2.in-addr.arpa domain name pointer 02dd6d37.bb.sky.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.109.221.2.in-addr.arpa	name = 02dd6d37.bb.sky.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.254.141.18 attackbots
May 20 14:05:37 [host] sshd[16771]: Invalid user s
May 20 14:05:37 [host] sshd[16771]: pam_unix(sshd:
May 20 14:05:39 [host] sshd[16771]: Failed passwor
2020-05-20 20:26:58
179.191.65.214 attackspambots
May 20 07:25:53 master sshd[21822]: Failed password for invalid user ecv from 179.191.65.214 port 41160 ssh2
May 20 07:38:04 master sshd[22269]: Failed password for invalid user ziy from 179.191.65.214 port 52180 ssh2
May 20 07:44:10 master sshd[22363]: Failed password for invalid user qmm from 179.191.65.214 port 55086 ssh2
May 20 07:49:53 master sshd[22428]: Failed password for invalid user zzi from 179.191.65.214 port 57990 ssh2
May 20 07:55:43 master sshd[22493]: Failed password for invalid user gpm from 179.191.65.214 port 60896 ssh2
May 20 08:01:32 master sshd[22936]: Failed password for invalid user nkb from 179.191.65.214 port 35566 ssh2
May 20 08:06:59 master sshd[22957]: Failed password for invalid user aiz from 179.191.65.214 port 38475 ssh2
May 20 08:12:32 master sshd[23060]: Failed password for invalid user xsa from 179.191.65.214 port 41378 ssh2
May 20 08:18:03 master sshd[23128]: Failed password for invalid user ep from 179.191.65.214 port 44285 ssh2
2020-05-20 20:55:26
51.255.172.198 attackbotsspam
Invalid user bulbakov from 51.255.172.198 port 48284
2020-05-20 20:24:48
203.130.23.2 attack
Unauthorized connection attempt from IP address 203.130.23.2 on Port 445(SMB)
2020-05-20 20:47:53
46.151.210.60 attack
472. On May 17 2020 experienced a Brute Force SSH login attempt -> 3 unique times by 46.151.210.60.
2020-05-20 20:57:08
204.48.19.139 attack
WordPress wp-login brute force :: 204.48.19.139 0.100 - [20/May/2020:07:46:19  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1837 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-05-20 20:53:47
128.199.108.159 attackbots
Invalid user caoyan from 128.199.108.159 port 36262
2020-05-20 20:50:47
49.234.47.124 attackspam
Repeated brute force against a port
2020-05-20 20:40:32
49.232.33.182 attackspam
$f2bV_matches
2020-05-20 20:49:48
167.71.76.122 attack
Invalid user wns from 167.71.76.122 port 39520
2020-05-20 20:33:07
51.254.37.192 attack
Auto Fail2Ban report, multiple SSH login attempts.
2020-05-20 20:25:16
49.235.75.19 attackbots
Invalid user paq from 49.235.75.19 port 23237
2020-05-20 20:37:26
167.86.73.56 attackbotsspam
DE - - [19/May/2020:16:11:30 +0300] GET /wp-login.php HTTP/1.1 403 292 - Mozilla/5.0 X11; Ubuntu; Linux x86_64; rv:62.0 Gecko/20100101 Firefox/62.0
2020-05-20 20:58:32
2.35.180.242 attackbots
Automatic report - Port Scan Attack
2020-05-20 20:38:39
14.18.103.163 attackspam
May 20 09:59:55 163-172-32-151 sshd[7504]: Invalid user wangjw from 14.18.103.163 port 54868
...
2020-05-20 20:30:53

Recently Reported IPs

187.113.47.100 105.234.168.181 209.106.66.99 109.213.2.23
128.223.52.238 5.189.200.176 105.150.31.155 45.166.199.158
222.141.218.107 71.53.73.89 185.53.88.36 74.254.129.69
34.216.135.112 35.166.91.249 105.56.16.88 27.254.82.179
142.225.5.9 32.52.148.32 121.170.5.74 39.230.55.158