Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Greece

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.55.124.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.55.124.44.			IN	A

;; AUTHORITY SECTION:
.			120	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:31:41 CST 2022
;; MSG SIZE  rcvd: 104
Host info
44.124.55.5.in-addr.arpa domain name pointer ppp005055124044.access.hol.gr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.124.55.5.in-addr.arpa	name = ppp005055124044.access.hol.gr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.86.164.102 attack
CMS (WordPress or Joomla) login attempt.
2020-04-29 14:07:25
129.211.94.30 attackbots
Apr 29 02:13:20 lanister sshd[14254]: Invalid user dalila from 129.211.94.30
Apr 29 02:13:20 lanister sshd[14254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.94.30
Apr 29 02:13:20 lanister sshd[14254]: Invalid user dalila from 129.211.94.30
Apr 29 02:13:22 lanister sshd[14254]: Failed password for invalid user dalila from 129.211.94.30 port 56054 ssh2
2020-04-29 14:26:13
103.102.138.10 attackspambots
SSH Brute Force
2020-04-29 14:04:14
167.172.207.15 attackspam
30120/udp 10001/udp 27036/udp...
[2020-04-14/29]25pkt,9pt.(udp)
2020-04-29 14:01:04
46.100.54.77 attackbots
Unauthorized connection attempt from IP address 46.100.54.77 on port 993
2020-04-29 13:56:00
103.104.17.139 attack
SSH Brute Force
2020-04-29 14:03:42
36.33.138.140 attackbots
Telnetd brute force attack detected by fail2ban
2020-04-29 14:15:49
206.189.26.171 attackspam
Apr 29 06:28:44 l03 sshd[31678]: Invalid user images from 206.189.26.171 port 48328
...
2020-04-29 14:17:24
47.52.239.42 attack
47.52.239.42 - - [29/Apr/2020:07:48:07 +0300] "POST /wp-login.php HTTP/1.1" 200 2173 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-29 14:22:38
163.172.118.125 attack
Apr 29 03:58:43 *** sshd[31454]: Invalid user wordpress from 163.172.118.125
2020-04-29 14:07:54
128.199.75.71 attack
2020-04-29T04:31:00.628865homeassistant sshd[18402]: Invalid user pke from 128.199.75.71 port 47969
2020-04-29T04:31:00.635601homeassistant sshd[18402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.75.71
...
2020-04-29 14:18:06
101.251.72.205 attackspambots
SSH Brute Force
2020-04-29 14:11:45
101.255.52.171 attack
SSH Brute Force
2020-04-29 14:11:17
58.213.68.94 attack
Invalid user reception from 58.213.68.94 port 56290
2020-04-29 13:58:31
121.229.63.151 attack
$f2bV_matches
2020-04-29 13:53:19

Recently Reported IPs

5.55.98.181 5.57.227.86 5.55.254.62 5.55.103.91
5.57.9.226 5.62.34.11 5.61.48.78 5.62.43.181
5.62.146.241 5.62.43.203 5.59.20.21 5.59.166.133
5.74.64.142 5.74.22.73 5.62.56.161 5.76.57.187
5.79.156.150 5.79.211.133 5.65.74.135 5.80.68.113