Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.211.6.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.211.6.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:52:31 CST 2025
;; MSG SIZE  rcvd: 104
Host info
b'Host 82.6.211.55.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 55.211.6.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
118.70.233.206 attackbotsspam
Sep 25 07:55:44 minden010 sshd[16746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.233.206
Sep 25 07:55:45 minden010 sshd[16746]: Failed password for invalid user daniella from 118.70.233.206 port 63552 ssh2
Sep 25 08:00:36 minden010 sshd[18352]: Failed password for root from 118.70.233.206 port 39256 ssh2
...
2020-09-25 21:13:10
111.229.194.38 attackspam
Invalid user hadoop from 111.229.194.38 port 56368
2020-09-25 20:55:52
129.226.138.179 attackbotsspam
Automatic report - Banned IP Access
2020-09-25 21:34:05
112.217.11.203 attackbotsspam
Invalid user wx from 112.217.11.203 port 47676
2020-09-25 21:29:25
52.183.122.141 attackspam
Sep 25 14:01:46 sso sshd[18195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.183.122.141
Sep 25 14:01:48 sso sshd[18195]: Failed password for invalid user 157 from 52.183.122.141 port 23768 ssh2
...
2020-09-25 21:35:18
23.100.10.209 attackbotsspam
Sep 25 14:14:53 fhem-rasp sshd[17811]: Invalid user 175 from 23.100.10.209 port 17555
...
2020-09-25 21:02:23
112.102.238.108 attack
Brute force blocker - service: proftpd1, proftpd2 - aantal: 33 - Thu Sep  6 06:55:18 2018
2020-09-25 21:31:00
200.41.86.59 attackbotsspam
Invalid user ftptest from 200.41.86.59 port 54422
2020-09-25 21:11:40
181.239.34.18 attack
Icarus honeypot on github
2020-09-25 20:59:36
221.130.29.58 attackspambots
Invalid user laurent from 221.130.29.58 port 15298
2020-09-25 21:19:26
2.57.122.172 attackspambots
TCP port : 3389
2020-09-25 21:07:07
185.234.216.108 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 185.234.216.108 (PL/Poland/-): 5 in the last 3600 secs - Sat Sep  8 12:08:55 2018
2020-09-25 21:19:54
175.147.54.63 attack
Telnetd brute force attack detected by fail2ban
2020-09-25 21:12:02
104.211.179.167 attackbotsspam
Multiple SSH login attempts.
2020-09-25 21:04:53
114.218.138.184 attack
lfd: (smtpauth) Failed SMTP AUTH login from 114.218.138.184 (CN/China/-): 5 in the last 3600 secs - Mon Sep 10 01:48:19 2018
2020-09-25 21:01:17

Recently Reported IPs

47.73.98.84 100.220.55.186 184.188.56.94 90.49.116.112
87.128.195.90 126.233.106.253 95.133.204.141 123.38.158.207
233.113.138.73 226.212.42.65 236.77.54.246 175.220.125.141
32.254.14.218 31.123.10.147 237.198.251.80 141.249.126.115
251.107.215.43 227.30.234.131 246.12.10.205 136.43.129.150