Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.222.116.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58458
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.222.116.249.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:49:09 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 249.116.222.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.222.116.249.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
88.255.251.92 attackbotsspam
Unauthorized connection attempt from IP address 88.255.251.92 on Port 445(SMB)
2019-06-26 09:24:04
200.45.134.1 attackspambots
Unauthorized connection attempt from IP address 200.45.134.1 on Port 445(SMB)
2019-06-26 09:17:34
188.236.108.189 attackbots
Jun 25 18:52:45 mxgate1 postfix/postscreen[813]: CONNECT from [188.236.108.189]:40930 to [176.31.12.44]:25
Jun 25 18:52:45 mxgate1 postfix/dnsblog[962]: addr 188.236.108.189 listed by domain zen.spamhaus.org as 127.0.0.11
Jun 25 18:52:45 mxgate1 postfix/dnsblog[962]: addr 188.236.108.189 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 25 18:52:45 mxgate1 postfix/dnsblog[963]: addr 188.236.108.189 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 25 18:52:45 mxgate1 postfix/dnsblog[960]: addr 188.236.108.189 listed by domain bl.spamcop.net as 127.0.0.2
Jun 25 18:52:45 mxgate1 postfix/dnsblog[959]: addr 188.236.108.189 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 25 18:52:50 mxgate1 postfix/dnsblog[958]: addr 188.236.108.189 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 25 18:52:51 mxgate1 postfix/postscreen[813]: DNSBL rank 6 for [188.236.108.189]:40930
Jun x@x
Jun 25 18:52:53 mxgate1 postfix/postscreen[813]: HANGUP after 1.6 from [188.236.108.189]........
-------------------------------
2019-06-26 10:01:16
80.93.210.82 attack
Unauthorized connection attempt from IP address 80.93.210.82 on Port 445(SMB)
2019-06-26 09:29:09
168.228.119.98 attackspam
Lines containing failures of 168.228.119.98
2019-06-25 18:46:06 dovecot_plain authenticator failed for ([168.228.119.98]) [168.228.119.98]: 535 Incorrect authentication data (set_id=help)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=168.228.119.98
2019-06-26 09:45:00
196.52.43.85 attackbotsspam
Honeypot hit.
2019-06-26 09:37:44
50.75.240.235 attackbots
Unauthorized connection attempt from IP address 50.75.240.235 on Port 445(SMB)
2019-06-26 09:17:13
168.232.18.2 attackspambots
Jun 25 23:21:42 [host] sshd[506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.18.2  user=root
Jun 25 23:21:45 [host] sshd[506]: Failed password for root from 168.232.18.2 port 53922 ssh2
Jun 25 23:23:42 [host] sshd[532]: Invalid user deploy from 168.232.18.2
Jun 25 23:23:42 [host] sshd[532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.18.2
2019-06-26 09:15:49
92.119.160.40 attackspam
26.06.2019 01:10:33 Connection to port 3309 blocked by firewall
2019-06-26 09:18:48
60.22.217.211 attackbots
Unauthorised access (Jun 25) SRC=60.22.217.211 LEN=40 TTL=49 ID=58381 TCP DPT=23 WINDOW=56429 SYN
2019-06-26 09:32:29
191.240.67.150 attackbotsspam
SMTP-sasl brute force
...
2019-06-26 09:40:03
62.232.124.166 attackspambots
NAME : P2P-CONNECTIONS-4-HWY1 CIDR : 62.232.124.0/24 DDoS attack United Kingdom - block certain countries :) IP: 62.232.124.166  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-26 09:54:24
198.50.161.20 attack
$f2bV_matches
2019-06-26 10:00:37
54.36.182.244 attack
2019-06-26T00:43:48.660029abusebot-8.cloudsearch.cf sshd\[22950\]: Invalid user gx from 54.36.182.244 port 44686
2019-06-26 09:39:46
54.36.148.45 attackspam
SQL Injection
2019-06-26 09:23:11

Recently Reported IPs

4.208.248.165 72.224.27.160 151.108.91.195 32.128.78.120
184.243.106.226 220.160.149.184 103.26.58.194 175.38.172.134
85.154.184.1 173.191.135.37 239.101.70.41 199.46.123.217
198.231.96.118 247.138.110.53 232.10.112.103 30.184.160.211
214.159.118.80 99.19.99.22 203.172.233.217 251.125.117.2