Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.48.0.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.48.0.89.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121901 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 20 05:27:59 CST 2025
;; MSG SIZE  rcvd: 103
Host info
b'Host 89.0.48.55.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 55.48.0.89.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
5.233.246.247 attackbotsspam
Unauthorized connection attempt from IP address 5.233.246.247 on Port 445(SMB)
2020-01-15 18:10:31
51.68.11.215 attack
Jan1505:48:34server4pure-ftpd:\(\?@103.127.41.103\)[WARNING]Authenticationfailedforuser[info]Jan1505:47:32server4pure-ftpd:\(\?@51.68.11.215\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:00server4pure-ftpd:\(\?@91.211.112.66\)[WARNING]Authenticationfailedforuser[info]Jan1505:47:15server4pure-ftpd:\(\?@51.68.11.215\)[WARNING]Authenticationfailedforuser[info]Jan1505:47:18server4pure-ftpd:\(\?@192.69.235.189\)[WARNING]Authenticationfailedforuser[info]Jan1505:47:22server4pure-ftpd:\(\?@51.68.11.215\)[WARNING]Authenticationfailedforuser[info]Jan1505:48:14server4pure-ftpd:\(\?@103.127.41.103\)[WARNING]Authenticationfailedforuser[info]Jan1505:46:53server4pure-ftpd:\(\?@192.69.235.189\)[WARNING]Authenticationfailedforuser[info]Jan1505:48:27server4pure-ftpd:\(\?@103.127.41.103\)[WARNING]Authenticationfailedforuser[info]Jan1505:47:27server4pure-ftpd:\(\?@51.68.11.215\)[WARNING]Authenticationfailedforuser[info]IPAddressesBlocked:103.127.41.103\(AU/Australia/103-127-41-103.reverse.digitalhost.com\)
2020-01-15 17:59:26
122.160.56.118 attackspambots
20/1/14@23:48:33: FAIL: Alarm-Network address from=122.160.56.118
...
2020-01-15 18:15:54
218.92.0.210 attackspam
Repeated brute force against a port
2020-01-15 17:49:28
49.88.112.110 attackspambots
Jan 15 17:02:35 webhost01 sshd[18601]: Failed password for root from 49.88.112.110 port 53047 ssh2
...
2020-01-15 18:19:50
120.194.7.10 attackbots
'IP reached maximum auth failures for a one day block'
2020-01-15 17:56:39
104.40.195.105 attackspam
Invalid user prueba from 104.40.195.105 port 34390
2020-01-15 18:07:50
5.101.0.209 attackspambots
HTTP/80/443 Probe, BF, WP, Hack -
2020-01-15 18:09:03
104.208.156.238 attack
Unauthorized connection attempt detected from IP address 104.208.156.238 to port 2220 [J]
2020-01-15 17:45:12
222.175.126.74 attackspam
Unauthorized connection attempt detected from IP address 222.175.126.74 to port 2220 [J]
2020-01-15 18:21:20
61.5.17.246 attackbots
1579063687 - 01/15/2020 05:48:07 Host: 61.5.17.246/61.5.17.246 Port: 445 TCP Blocked
2020-01-15 18:24:24
86.120.90.190 attackbotsspam
Jan 15 05:49:21 dev sshd\[31344\]: Invalid user admin from 86.120.90.190 port 43413
Jan 15 05:49:21 dev sshd\[31344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.120.90.190
Jan 15 05:49:23 dev sshd\[31344\]: Failed password for invalid user admin from 86.120.90.190 port 43413 ssh2
2020-01-15 17:48:57
222.188.93.58 attackspam
Jan 15 01:55:23 ny01 sshd[26636]: Failed password for root from 222.188.93.58 port 35938 ssh2
Jan 15 01:57:46 ny01 sshd[26971]: Failed password for root from 222.188.93.58 port 45496 ssh2
2020-01-15 18:23:34
80.88.90.86 attackspam
Unauthorized connection attempt detected from IP address 80.88.90.86 to port 2220 [J]
2020-01-15 18:23:57
117.221.34.53 attackspam
Jan 15 05:49:17 dev sshd\[31333\]: Invalid user admin from 117.221.34.53 port 32983
Jan 15 05:49:17 dev sshd\[31333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.221.34.53
Jan 15 05:49:18 dev sshd\[31333\]: Failed password for invalid user admin from 117.221.34.53 port 32983 ssh2
2020-01-15 17:53:15

Recently Reported IPs

179.185.190.38 179.200.180.136 43.104.13.140 45.147.250.32
117.8.19.205 33.133.188.42 216.164.20.151 240.92.175.229
141.24.146.157 237.88.174.145 237.171.201.87 99.196.70.4
185.129.174.102 1.13.220.220 212.119.43.134 67.187.237.47
160.70.235.151 208.53.144.185 135.233.13.34 194.200.126.66