Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.211.248.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.211.248.82.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 07:53:36 CST 2023
;; MSG SIZE  rcvd: 106
Host info
b'Host 82.248.211.55.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 55.211.248.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
128.199.143.89 attack
Automatic report: SSH brute force attempt
2020-03-12 18:16:08
116.101.80.72 attackspambots
$f2bV_matches
2020-03-12 17:48:42
122.51.191.69 attack
Mar 12 08:00:29 localhost sshd\[7232\]: Invalid user panyongjia from 122.51.191.69 port 52248
Mar 12 08:00:29 localhost sshd\[7232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.191.69
Mar 12 08:00:30 localhost sshd\[7232\]: Failed password for invalid user panyongjia from 122.51.191.69 port 52248 ssh2
2020-03-12 17:48:02
178.128.227.211 attackspambots
Invalid user louis from 178.128.227.211 port 40604
2020-03-12 18:11:08
94.230.208.147 attackbots
Automatic report - Banned IP Access
2020-03-12 17:50:03
209.159.144.250 attackspambots
DATE:2020-03-12 06:15:16, IP:209.159.144.250, PORT:ssh SSH brute force auth (docker-dc)
2020-03-12 17:35:49
92.63.194.104 attack
Mar 12 10:59:01 srv206 sshd[26138]: Invalid user admin from 92.63.194.104
...
2020-03-12 18:01:33
92.63.194.107 attack
Mar 12 10:30:52 localhost sshd\[12970\]: Invalid user admin from 92.63.194.107
Mar 12 10:30:52 localhost sshd\[12970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.107
Mar 12 10:30:53 localhost sshd\[12970\]: Failed password for invalid user admin from 92.63.194.107 port 38113 ssh2
Mar 12 10:31:08 localhost sshd\[13005\]: Invalid user ubnt from 92.63.194.107
Mar 12 10:31:08 localhost sshd\[13005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.107
...
2020-03-12 17:32:41
180.177.82.42 attackbotsspam
Hits on port : 5555
2020-03-12 17:47:23
14.244.74.252 attack
Unauthorized connection attempt detected from IP address 14.244.74.252 to port 445
2020-03-12 17:55:38
123.235.36.26 attack
Automatic report: SSH brute force attempt
2020-03-12 18:08:09
180.251.0.45 attackbotsspam
DATE:2020-03-12 04:45:45, IP:180.251.0.45, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-03-12 17:57:48
14.63.162.208 attack
Automatic report: SSH brute force attempt
2020-03-12 17:28:33
14.140.249.74 attack
20/3/11@23:48:36: FAIL: Alarm-Network address from=14.140.249.74
...
2020-03-12 18:06:18
197.50.176.170 attack
Unauthorized connection attempt detected from IP address 197.50.176.170 to port 5555
2020-03-12 17:45:05

Recently Reported IPs

211.114.94.179 187.134.212.212 50.74.63.231 84.192.187.207
98.210.207.194 28.35.8.58 219.254.90.50 147.51.200.127
139.26.35.108 99.4.242.91 85.172.111.204 29.142.173.136
140.65.105.109 220.83.87.21 253.112.231.14 2.98.10.59
176.123.6.10 8.9.92.134 244.92.172.113 222.126.63.160