Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.109.52.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.109.52.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 04:24:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 216.52.109.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.109.52.216.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
130.0.29.77 attack
Request: "GET / HTTP/1.1"
2019-06-22 05:09:02
182.18.171.148 attackbots
SSH Brute Force, server-1 sshd[3524]: Failed password for invalid user mick from 182.18.171.148 port 37330 ssh2
2019-06-22 05:16:34
103.41.146.207 attackspambots
Request: "GET / HTTP/1.1"
2019-06-22 04:46:04
45.55.170.158 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 05:15:44
14.85.88.4 attackspam
Autoban   14.85.88.4 ABORTED AUTH
2019-06-22 05:07:46
120.52.152.18 attackspambots
" "
2019-06-22 05:11:41
1.160.59.172 attackbotsspam
23/tcp
[2019-06-21]1pkt
2019-06-22 05:01:20
178.151.255.76 attackspambots
445/tcp
[2019-06-21]1pkt
2019-06-22 05:23:48
115.28.154.44 attackbotsspam
xmlrpc attack
2019-06-22 04:48:36
37.49.224.204 attack
Invalid user support from 37.49.224.204 port 55540
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.204
Failed password for invalid user support from 37.49.224.204 port 55540 ssh2
Invalid user admin from 37.49.224.204 port 55609
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.204
2019-06-22 05:09:42
61.148.29.198 attack
$f2bV_matches
2019-06-22 04:49:49
94.23.218.74 attackspam
2019-06-21T17:19:40.202607mizuno.rwx.ovh sshd[1462]: Connection from 94.23.218.74 port 51704 on 78.46.61.178 port 22
2019-06-21T17:19:40.381924mizuno.rwx.ovh sshd[1462]: Invalid user ti from 94.23.218.74 port 51704
2019-06-21T17:19:40.388983mizuno.rwx.ovh sshd[1462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.218.74
2019-06-21T17:19:40.202607mizuno.rwx.ovh sshd[1462]: Connection from 94.23.218.74 port 51704 on 78.46.61.178 port 22
2019-06-21T17:19:40.381924mizuno.rwx.ovh sshd[1462]: Invalid user ti from 94.23.218.74 port 51704
2019-06-21T17:19:42.289445mizuno.rwx.ovh sshd[1462]: Failed password for invalid user ti from 94.23.218.74 port 51704 ssh2
...
2019-06-22 05:12:46
43.254.215.172 attackspambots
2323/tcp
[2019-06-21]1pkt
2019-06-22 05:13:37
118.89.229.244 attack
Jun 21 21:45:39 vps647732 sshd[17284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.244
Jun 21 21:45:40 vps647732 sshd[17284]: Failed password for invalid user pie from 118.89.229.244 port 39328 ssh2
...
2019-06-22 05:14:43
95.9.192.200 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 05:16:06

Recently Reported IPs

57.60.142.163 141.252.200.210 243.232.77.197 30.237.184.169
97.141.161.111 199.145.136.135 213.45.171.107 210.83.31.114
245.37.48.247 220.179.23.234 172.150.27.167 106.215.193.227
250.50.38.28 88.47.203.45 21.184.195.143 196.99.205.204
245.205.19.212 109.215.230.7 155.228.94.141 44.176.156.126