Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.105.7.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.105.7.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:59:24 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 104.7.105.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.105.7.104.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
37.229.174.188 attack
Invalid user user from 37.229.174.188 port 55724
2019-10-25 03:08:15
164.8.132.62 attack
Invalid user jboss from 164.8.132.62 port 9562
2019-10-25 02:44:40
41.226.248.221 attackspambots
Invalid user www from 41.226.248.221 port 25760
2019-10-25 03:06:38
182.73.123.118 attackbots
Oct 24 00:12:44 server sshd\[27841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118 
Oct 24 00:12:46 server sshd\[27841\]: Failed password for invalid user neo from 182.73.123.118 port 35464 ssh2
Oct 24 20:02:19 server sshd\[26531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118  user=root
Oct 24 20:02:21 server sshd\[26531\]: Failed password for root from 182.73.123.118 port 40135 ssh2
Oct 24 20:15:29 server sshd\[29879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118  user=root
...
2019-10-25 02:39:14
106.75.33.66 attackspambots
ssh failed login
2019-10-25 02:55:22
77.81.230.143 attackbots
Automatic report - Banned IP Access
2019-10-25 03:01:46
203.110.166.51 attack
reported_by_cryptodad
2019-10-25 02:33:49
49.235.124.192 attack
Invalid user guest from 49.235.124.192 port 35650
2019-10-25 03:03:40
79.58.50.145 attack
Invalid user user from 79.58.50.145 port 59456
2019-10-25 03:00:53
5.196.110.170 attack
Invalid user support from 5.196.110.170 port 39538
2019-10-25 03:11:14
176.31.128.45 attackspam
Invalid user to from 176.31.128.45 port 45816
2019-10-25 02:42:34
18.189.170.233 attack
Invalid user support from 18.189.170.233 port 48664
2019-10-25 03:10:13
196.203.31.154 attackbots
Invalid user ubuntu from 196.203.31.154 port 40990
2019-10-25 02:35:06
68.251.142.26 attack
invalid user
2019-10-25 03:02:24
212.237.22.95 attack
Invalid user murai from 212.237.22.95 port 33836
2019-10-25 02:31:36

Recently Reported IPs

227.88.183.147 99.227.61.147 124.146.186.177 5.209.7.6
167.14.127.232 3.10.169.254 182.164.84.192 86.1.216.230
117.237.38.54 73.160.5.139 70.253.122.149 20.254.146.131
130.174.56.201 215.119.179.3 240.53.110.22 180.201.232.215
169.77.78.20 44.73.137.164 8.104.233.120 199.34.224.28