Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.104.239.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4759
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.104.239.214.			IN	A

;; AUTHORITY SECTION:
.			441	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060800 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 08 18:56:15 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 214.239.104.55.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.239.104.55.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
41.74.112.15 attack
Feb  9 02:42:57 plex sshd[16746]: Invalid user vik from 41.74.112.15 port 36391
2020-02-09 09:57:08
107.6.183.229 attack
Port scan: Attack repeated for 24 hours
2020-02-09 09:49:51
207.102.103.201 attack
Automatic report - Port Scan Attack
2020-02-09 09:24:12
189.202.204.237 attackspambots
Feb  9 02:29:19 dedicated sshd[15361]: Invalid user iro from 189.202.204.237 port 41507
2020-02-09 09:31:31
182.61.14.224 attackbots
SSH invalid-user multiple login attempts
2020-02-09 09:29:31
171.37.105.169 attackspam
Feb  9 00:46:30 ws26vmsma01 sshd[225140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.37.105.169
Feb  9 00:46:32 ws26vmsma01 sshd[225140]: Failed password for invalid user czq from 171.37.105.169 port 4183 ssh2
...
2020-02-09 09:55:06
91.134.140.242 attack
sshd jail - ssh hack attempt
2020-02-09 09:38:36
139.99.70.210 attackspam
SSH-BruteForce
2020-02-09 09:24:49
222.186.175.217 attack
Feb  9 02:37:56 meumeu sshd[29294]: Failed password for root from 222.186.175.217 port 44574 ssh2
Feb  9 02:38:00 meumeu sshd[29294]: Failed password for root from 222.186.175.217 port 44574 ssh2
Feb  9 02:38:04 meumeu sshd[29294]: Failed password for root from 222.186.175.217 port 44574 ssh2
Feb  9 02:38:08 meumeu sshd[29294]: Failed password for root from 222.186.175.217 port 44574 ssh2
...
2020-02-09 09:39:43
200.57.111.161 attackspambots
Automatic report - Port Scan Attack
2020-02-09 09:40:38
1.6.114.75 attack
Feb  9 01:47:18 MK-Soft-VM8 sshd[22541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.6.114.75 
Feb  9 01:47:20 MK-Soft-VM8 sshd[22541]: Failed password for invalid user kfh from 1.6.114.75 port 53012 ssh2
...
2020-02-09 09:23:45
221.125.165.59 attack
2020-02-09T00:42:48.164061abusebot-2.cloudsearch.cf sshd[27032]: Invalid user mim from 221.125.165.59 port 51198
2020-02-09T00:42:48.170228abusebot-2.cloudsearch.cf sshd[27032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59
2020-02-09T00:42:48.164061abusebot-2.cloudsearch.cf sshd[27032]: Invalid user mim from 221.125.165.59 port 51198
2020-02-09T00:42:50.748501abusebot-2.cloudsearch.cf sshd[27032]: Failed password for invalid user mim from 221.125.165.59 port 51198 ssh2
2020-02-09T00:46:44.393835abusebot-2.cloudsearch.cf sshd[27270]: Invalid user ax from 221.125.165.59 port 56854
2020-02-09T00:46:44.399333abusebot-2.cloudsearch.cf sshd[27270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59
2020-02-09T00:46:44.393835abusebot-2.cloudsearch.cf sshd[27270]: Invalid user ax from 221.125.165.59 port 56854
2020-02-09T00:46:45.708146abusebot-2.cloudsearch.cf sshd[27270]: Failed pass
...
2020-02-09 09:48:58
211.169.249.156 attackbotsspam
Feb  9 02:35:36 legacy sshd[20589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.169.249.156
Feb  9 02:35:39 legacy sshd[20589]: Failed password for invalid user eob from 211.169.249.156 port 52184 ssh2
Feb  9 02:38:47 legacy sshd[20812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.169.249.156
...
2020-02-09 09:49:18
112.85.42.176 attackbots
Feb  8 15:58:13 web9 sshd\[25320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Feb  8 15:58:16 web9 sshd\[25320\]: Failed password for root from 112.85.42.176 port 6095 ssh2
Feb  8 15:58:31 web9 sshd\[25347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Feb  8 15:58:34 web9 sshd\[25347\]: Failed password for root from 112.85.42.176 port 41118 ssh2
Feb  8 15:58:37 web9 sshd\[25347\]: Failed password for root from 112.85.42.176 port 41118 ssh2
2020-02-09 09:59:21
198.98.52.141 attack
Feb  9 00:47:03 l02a sshd[22442]: Invalid user vagrant from 198.98.52.141
Feb  9 00:47:03 l02a sshd[22452]: Invalid user tomcat from 198.98.52.141
Feb  9 00:47:03 l02a sshd[22446]: Invalid user deploy from 198.98.52.141
2020-02-09 09:40:54

Recently Reported IPs

203.163.140.138 216.43.86.193 38.236.43.32 4.117.179.242
242.19.245.13 34.255.158.186 145.252.3.124 130.252.117.36
200.36.120.228 251.62.143.51 108.106.144.215 37.79.94.79
244.199.152.205 4.241.227.199 163.94.159.183 206.172.111.0
16.199.80.222 109.178.49.173 157.240.226.16 175.89.203.1