Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.24.238.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15817
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.24.238.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 16:20:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 55.238.24.252.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.238.24.252.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
163.172.247.10 attackspam
fraudulent SSH attempt
2020-02-07 23:45:03
203.128.244.210 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-07 23:55:44
169.38.82.150 attackbots
ICMP MH Probe, Scan /Distributed -
2020-02-07 23:21:34
185.147.212.12 attackspambots
[2020-02-07 10:59:12] NOTICE[1148] chan_sip.c: Registration from '' failed for '185.147.212.12:54786' - Wrong password
[2020-02-07 10:59:12] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-07T10:59:12.190-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="1499",SessionID="0x7fd82c307128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.212.12/54786",Challenge="23c0ddbe",ReceivedChallenge="23c0ddbe",ReceivedHash="ff5bab61bd81202b3cb5be332c3de82f"
[2020-02-07 10:59:58] NOTICE[1148] chan_sip.c: Registration from '' failed for '185.147.212.12:50701' - Wrong password
[2020-02-07 10:59:58] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-07T10:59:58.298-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="4774",SessionID="0x7fd82c3c1c38",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.21
...
2020-02-08 00:02:26
89.248.168.41 attack
Feb  7 16:10:50 h2177944 kernel: \[4286312.899697\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=35021 PROTO=TCP SPT=46159 DPT=1471 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  7 16:10:50 h2177944 kernel: \[4286312.899710\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=35021 PROTO=TCP SPT=46159 DPT=1471 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  7 16:57:00 h2177944 kernel: \[4289081.949954\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=18608 PROTO=TCP SPT=46159 DPT=1706 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  7 16:57:00 h2177944 kernel: \[4289081.949968\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=18608 PROTO=TCP SPT=46159 DPT=1706 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  7 16:59:00 h2177944 kernel: \[4289202.245122\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.41 DST=85.214.117.9
2020-02-08 00:11:47
220.132.94.232 attackspambots
Honeypot attack, port: 81, PTR: 220-132-94-232.HINET-IP.hinet.net.
2020-02-07 23:32:04
34.244.194.13 attackbots
Lines containing failures of 34.244.194.13
Feb  6 07:31:32 myhost sshd[29543]: Invalid user fnu from 34.244.194.13 port 58140
Feb  6 07:31:32 myhost sshd[29543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.244.194.13
Feb  6 07:31:35 myhost sshd[29543]: Failed password for invalid user fnu from 34.244.194.13 port 58140 ssh2
Feb  6 07:31:35 myhost sshd[29543]: Received disconnect from 34.244.194.13 port 58140:11: Bye Bye [preauth]
Feb  6 07:31:35 myhost sshd[29543]: Disconnected from invalid user fnu 34.244.194.13 port 58140 [preauth]
Feb  6 07:47:06 myhost sshd[29634]: Invalid user edj from 34.244.194.13 port 33072
Feb  6 07:47:06 myhost sshd[29634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.244.194.13
Feb  6 07:47:07 myhost sshd[29634]: Failed password for invalid user edj from 34.244.194.13 port 33072 ssh2
Feb  6 07:47:07 myhost sshd[29634]: Received disconnect from 34.244.19........
------------------------------
2020-02-07 23:54:10
79.101.58.69 attack
Web App Attack
2020-02-07 23:52:48
179.52.76.37 attackbots
Honeypot attack, port: 81, PTR: 37.76.52.179.d.dyn.claro.net.do.
2020-02-07 23:23:02
64.225.24.239 attack
Feb  7 10:47:23 plusreed sshd[12928]: Invalid user xxw from 64.225.24.239
...
2020-02-07 23:54:57
165.227.77.120 attackspam
fraudulent SSH attempt
2020-02-07 23:19:21
162.243.129.160 attack
trying to access non-authorized port
2020-02-07 23:42:02
125.138.3.239 attack
Port probing on unauthorized port 23
2020-02-07 23:30:01
187.141.128.42 attackbots
2020-02-07T09:08:22.092644vostok sshd\[17783\]: Invalid user shd from 187.141.128.42 port 35932 | Triggered by Fail2Ban at Vostok web server
2020-02-07 23:24:30
93.84.114.148 attackspambots
Feb  2 19:05:22 cumulus sshd[22210]: Invalid user operator from 93.84.114.148 port 49006
Feb  2 19:05:22 cumulus sshd[22210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.84.114.148
Feb  2 19:05:24 cumulus sshd[22210]: Failed password for invalid user operator from 93.84.114.148 port 49006 ssh2
Feb  2 19:05:24 cumulus sshd[22210]: Received disconnect from 93.84.114.148 port 49006:11: Bye Bye [preauth]
Feb  2 19:05:24 cumulus sshd[22210]: Disconnected from 93.84.114.148 port 49006 [preauth]
Feb  2 19:20:40 cumulus sshd[22742]: Invalid user admin from 93.84.114.148 port 52122
Feb  2 19:20:40 cumulus sshd[22742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.84.114.148
Feb  2 19:20:42 cumulus sshd[22742]: Failed password for invalid user admin from 93.84.114.148 port 52122 ssh2
Feb  2 19:20:42 cumulus sshd[22742]: Received disconnect from 93.84.114.148 port 52122:11: Bye Bye [preauth........
-------------------------------
2020-02-07 23:48:57

Recently Reported IPs

225.9.241.27 242.94.214.17 82.184.203.14 133.196.136.14
113.91.85.77 19.172.226.234 233.77.10.39 237.100.181.171
49.179.107.175 69.230.163.61 244.200.153.248 106.65.34.139
143.200.210.86 222.112.200.227 74.152.95.10 171.163.240.119
128.64.84.199 152.221.14.34 98.49.150.81 28.28.80.239