Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.55.2.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.55.2.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 15:27:32 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 108.2.55.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.2.55.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.161.34.34 attackspambots
2020-03-09T05:53:43.020134abusebot.cloudsearch.cf sshd[1256]: Invalid user fake from 51.161.34.34 port 48662
2020-03-09T05:53:43.026184abusebot.cloudsearch.cf sshd[1256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.ip-51-161-34.net
2020-03-09T05:53:43.020134abusebot.cloudsearch.cf sshd[1256]: Invalid user fake from 51.161.34.34 port 48662
2020-03-09T05:53:44.851578abusebot.cloudsearch.cf sshd[1256]: Failed password for invalid user fake from 51.161.34.34 port 48662 ssh2
2020-03-09T05:53:46.500639abusebot.cloudsearch.cf sshd[1261]: Invalid user ubnt from 51.161.34.34 port 54080
2020-03-09T05:53:46.506392abusebot.cloudsearch.cf sshd[1261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.ip-51-161-34.net
2020-03-09T05:53:46.500639abusebot.cloudsearch.cf sshd[1261]: Invalid user ubnt from 51.161.34.34 port 54080
2020-03-09T05:53:48.743487abusebot.cloudsearch.cf sshd[1261]: Failed password for invalid 
...
2020-03-09 15:18:33
218.78.46.81 attack
$f2bV_matches
2020-03-09 15:18:46
51.83.66.171 attack
smtp
2020-03-09 15:37:31
69.229.6.34 attackbotsspam
Mar  9 03:43:34 localhost sshd[8270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.34  user=root
Mar  9 03:43:36 localhost sshd[8270]: Failed password for root from 69.229.6.34 port 58118 ssh2
Mar  9 03:46:54 localhost sshd[8882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.34  user=root
Mar  9 03:46:57 localhost sshd[8882]: Failed password for root from 69.229.6.34 port 54252 ssh2
Mar  9 03:50:19 localhost sshd[12741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.34  user=root
Mar  9 03:50:21 localhost sshd[12741]: Failed password for root from 69.229.6.34 port 50346 ssh2
...
2020-03-09 15:26:10
185.156.73.49 attack
ET DROP Dshield Block Listed Source group 1 - port: 7046 proto: TCP cat: Misc Attack
2020-03-09 15:26:53
74.122.10.9 attack
Mar  9 07:57:36 * sshd[3868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.122.10.9
Mar  9 07:57:38 * sshd[3868]: Failed password for invalid user bot from 74.122.10.9 port 39986 ssh2
2020-03-09 15:28:29
92.119.160.142 attack
Port scan detected on ports: 3414[TCP], 81[TCP], 20600[TCP]
2020-03-09 15:18:01
218.94.140.106 attackbotsspam
Mar  9 07:13:34 localhost sshd\[26011\]: Invalid user password from 218.94.140.106 port 2311
Mar  9 07:13:34 localhost sshd\[26011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.140.106
Mar  9 07:13:36 localhost sshd\[26011\]: Failed password for invalid user password from 218.94.140.106 port 2311 ssh2
2020-03-09 15:40:51
134.73.51.189 attackspam
Mar  9 04:40:47 mail.srvfarm.net postfix/smtpd[3846778]: NOQUEUE: reject: RCPT from unknown[134.73.51.189]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  9 04:40:55 mail.srvfarm.net postfix/smtpd[3846782]: NOQUEUE: reject: RCPT from unknown[134.73.51.189]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  9 04:41:54 mail.srvfarm.net postfix/smtpd[3846778]: NOQUEUE: reject: RCPT from unknown[134.73.51.189]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  9 04:43:28 mail.srvfarm.net postfix/smtpd[3846786]: NOQUEUE: reject: RCPT from unknown[134.73.51.189]: 450 4.1.8 : Sender add
2020-03-09 15:01:23
14.177.235.243 attackspambots
Port probing on unauthorized port 445
2020-03-09 15:25:19
185.211.245.198 attackbotsspam
Mar  9 07:44:28 mail.srvfarm.net postfix/smtpd[3911625]: warning: unknown[185.211.245.198]: SASL PLAIN authentication failed: 
Mar  9 07:44:28 mail.srvfarm.net postfix/smtpd[3907941]: warning: unknown[185.211.245.198]: SASL PLAIN authentication failed: 
Mar  9 07:44:28 mail.srvfarm.net postfix/smtpd[3906416]: warning: unknown[185.211.245.198]: SASL PLAIN authentication failed: 
Mar  9 07:44:28 mail.srvfarm.net postfix/smtpd[3906416]: lost connection after AUTH from unknown[185.211.245.198]
Mar  9 07:44:28 mail.srvfarm.net postfix/smtpd[3907941]: lost connection after AUTH from unknown[185.211.245.198]
2020-03-09 15:00:28
180.167.233.252 attack
Mar  9 09:20:44 areeb-Workstation sshd[13991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.233.252 
Mar  9 09:20:45 areeb-Workstation sshd[13991]: Failed password for invalid user qwewq from 180.167.233.252 port 44050 ssh2
...
2020-03-09 15:12:20
217.112.142.98 attack
Mar  9 04:38:21 mail.srvfarm.net postfix/smtpd[3846786]: NOQUEUE: reject: RCPT from unknown[217.112.142.98]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  9 04:42:14 mail.srvfarm.net postfix/smtpd[3841579]: NOQUEUE: reject: RCPT from unknown[217.112.142.98]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  9 04:42:15 mail.srvfarm.net postfix/smtpd[3845848]: NOQUEUE: reject: RCPT from unknown[217.112.142.98]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  9 04:42:19 mail.srvfarm.net postfix/smtpd[3841582]: NOQUEUE: reject: RCPT from unknown[217.112.
2020-03-09 14:59:12
171.229.224.111 attackbotsspam
1583725816 - 03/09/2020 04:50:16 Host: 171.229.224.111/171.229.224.111 Port: 445 TCP Blocked
2020-03-09 15:29:54
154.8.209.64 attackbots
Mar  9 08:01:33 h1745522 sshd[23847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.209.64  user=root
Mar  9 08:01:35 h1745522 sshd[23847]: Failed password for root from 154.8.209.64 port 36854 ssh2
Mar  9 08:04:27 h1745522 sshd[23916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.209.64  user=root
Mar  9 08:04:30 h1745522 sshd[23916]: Failed password for root from 154.8.209.64 port 40662 ssh2
Mar  9 08:07:25 h1745522 sshd[24038]: Invalid user air from 154.8.209.64 port 44488
Mar  9 08:07:25 h1745522 sshd[24038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.209.64
Mar  9 08:07:25 h1745522 sshd[24038]: Invalid user air from 154.8.209.64 port 44488
Mar  9 08:07:27 h1745522 sshd[24038]: Failed password for invalid user air from 154.8.209.64 port 44488 ssh2
Mar  9 08:10:23 h1745522 sshd[24210]: pam_unix(sshd:auth): authentication failure; logname
...
2020-03-09 15:11:08

Recently Reported IPs

48.117.199.174 206.179.37.9 46.39.212.17 152.51.77.46
200.155.246.204 237.189.149.140 90.157.209.188 172.79.247.66
142.236.70.78 176.254.135.177 213.128.210.142 213.151.240.243
159.163.86.47 178.10.86.54 58.174.105.149 157.59.0.229
20.184.168.254 166.223.200.196 110.247.45.254 50.152.210.199