Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Israel

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.55.109.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3790
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.55.109.83.			IN	A

;; AUTHORITY SECTION:
.			319	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:17:35 CST 2022
;; MSG SIZE  rcvd: 104
Host info
83.109.55.2.in-addr.arpa domain name pointer 31-154-109-83.orange.net.il.
83.109.55.2.in-addr.arpa domain name pointer 2-55-109-83.orange.net.il.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.109.55.2.in-addr.arpa	name = 31-154-109-83.orange.net.il.
83.109.55.2.in-addr.arpa	name = 2-55-109-83.orange.net.il.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
148.251.20.143 attackbotsspam
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-27 08:08:13
104.206.128.62 attackspam
ET SCAN Suspicious inbound to PostgreSQL port 5432 - port: 5432 proto: TCP cat: Potentially Bad Traffic
2019-10-27 08:11:44
77.247.108.77 attack
10/27/2019-00:29:07.081399 77.247.108.77 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 74
2019-10-27 08:18:29
185.156.73.42 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-10-27 08:02:46
185.156.73.45 attackspam
Multiport scan : 25 ports scanned 1219 1220 1221 8134 9814 9815 9816 35434 35435 35436 36892 36893 36894 57769 57770 57771 59440 59441 59442 60841 60842 60843 63697 63698 63699
2019-10-27 08:02:16
92.119.160.143 attackbots
firewall-block, port(s): 39932/tcp, 45961/tcp, 51309/tcp, 56774/tcp, 57241/tcp, 57577/tcp
2019-10-27 07:43:22
60.10.199.214 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:53:36
183.233.197.42 attackbotsspam
10/27/2019-01:19:32.852746 183.233.197.42 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-27 08:04:55
198.108.67.85 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 3073 proto: TCP cat: Misc Attack
2019-10-27 07:58:18
93.174.95.106 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 94 - port: 21379 proto: TCP cat: Misc Attack
2019-10-27 08:12:15
89.248.160.178 attackspam
Port Scan: TCP/54492
2019-10-27 08:15:34
77.247.108.119 attack
Multiport scan : 5 ports scanned 808 8077 8078 8079 8081
2019-10-27 07:50:49
92.53.65.128 attack
firewall-block, port(s): 3387/tcp
2019-10-27 07:46:46
148.251.20.130 attack
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-27 08:09:37
89.248.162.168 attack
10/27/2019-01:58:42.334909 89.248.162.168 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 99
2019-10-27 08:14:24

Recently Reported IPs

2.50.40.12 2.55.107.225 2.50.34.220 2.56.119.76
2.56.139.199 2.56.255.35 2.56.56.69 2.56.116.194
2.56.57.21 2.56.116.111 2.56.57.62 2.56.59.102
2.56.57.167 2.56.61.146 2.56.97.51 2.56.97.195
2.57.122.248 2.57.122.154 2.57.122.32 2.57.121.253