Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.55.2.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4088
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.55.2.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:22:37 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 104.2.55.44.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.2.55.44.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.245.109.223 attackspambots
FTP Brute-Force reported by Fail2Ban
2020-03-11 09:34:20
176.113.115.246 attackbots
Mar 10 20:45:04 [host] kernel: [499271.981242] [UF
Mar 10 20:47:15 [host] kernel: [499402.256224] [UF
Mar 10 20:47:37 [host] kernel: [499425.112254] [UF
Mar 10 20:48:16 [host] kernel: [499463.374193] [UF
Mar 10 20:48:38 [host] kernel: [499485.466182] [UF
Mar 10 20:49:08 [host] kernel: [499515.316654] [UF
2020-03-11 09:40:11
125.124.91.206 attackbots
Mar 10 22:51:26 ns382633 sshd\[22218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.91.206  user=root
Mar 10 22:51:28 ns382633 sshd\[22218\]: Failed password for root from 125.124.91.206 port 54032 ssh2
Mar 10 23:04:09 ns382633 sshd\[24397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.91.206  user=root
Mar 10 23:04:11 ns382633 sshd\[24397\]: Failed password for root from 125.124.91.206 port 34534 ssh2
Mar 10 23:07:15 ns382633 sshd\[25055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.91.206  user=root
2020-03-11 09:57:13
190.64.68.178 attack
Unauthorized SSH login attempts
2020-03-11 10:10:03
192.95.6.110 attack
Mar 11 01:59:51 sip sshd[14619]: Failed password for root from 192.95.6.110 port 56351 ssh2
Mar 11 02:16:48 sip sshd[18982]: Failed password for root from 192.95.6.110 port 38159 ssh2
2020-03-11 09:56:15
218.23.104.250 attackspam
suspicious action Tue, 10 Mar 2020 15:08:27 -0300
2020-03-11 09:59:00
92.118.37.74 attackbots
Mar 11 00:32:08 debian-2gb-nbg1-2 kernel: \[6142273.885377\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=3428 PROTO=TCP SPT=58558 DPT=6231 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-11 09:53:52
125.26.15.28 attackspam
SSH Brute-Force reported by Fail2Ban
2020-03-11 10:04:12
46.17.175.21 attackbots
WordPress wp-login brute force :: 46.17.175.21 0.068 BYPASS [10/Mar/2020:18:08:11  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2252 "-" "-"
2020-03-11 10:14:05
82.130.211.206 attackbots
Unauthorized connection attempt detected from IP address 82.130.211.206 to port 80
2020-03-11 09:49:43
114.67.110.227 attack
2020-03-10T17:17:19.823575linuxbox-skyline sshd[9975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.110.227  user=root
2020-03-10T17:17:21.950409linuxbox-skyline sshd[9975]: Failed password for root from 114.67.110.227 port 59626 ssh2
...
2020-03-11 10:09:33
51.38.129.120 attack
Mar 10 20:23:27 mout sshd[10179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.129.120  user=root
Mar 10 20:23:28 mout sshd[10179]: Failed password for root from 51.38.129.120 port 45100 ssh2
2020-03-11 09:32:43
164.132.111.76 attackspambots
Invalid user XiaB from 164.132.111.76 port 53922
2020-03-11 10:15:41
118.37.159.66 attackbotsspam
Unauthorized connection attempt detected from IP address 118.37.159.66 to port 5555
2020-03-11 09:38:45
116.193.134.75 attack
Mar 10 14:20:49 web1 sshd\[16486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.134.75  user=root
Mar 10 14:20:52 web1 sshd\[16486\]: Failed password for root from 116.193.134.75 port 39985 ssh2
Mar 10 14:25:05 web1 sshd\[17206\]: Invalid user andoria from 116.193.134.75
Mar 10 14:25:05 web1 sshd\[17206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.134.75
Mar 10 14:25:07 web1 sshd\[17206\]: Failed password for invalid user andoria from 116.193.134.75 port 58345 ssh2
2020-03-11 09:44:00

Recently Reported IPs

79.22.125.131 193.223.98.229 68.140.43.37 240.168.251.183
77.226.154.5 4.236.42.26 219.232.162.108 42.185.93.121
71.25.0.235 26.159.187.230 27.125.253.1 159.52.3.36
98.200.119.7 163.80.252.211 119.101.103.239 101.15.107.87
179.18.75.71 225.228.15.52 255.113.248.192 171.125.233.162