Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.49.8.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2876
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.49.8.109.			IN	A

;; AUTHORITY SECTION:
.			172	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123001 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 10:18:00 CST 2021
;; MSG SIZE  rcvd: 104
Host info
Host 109.8.49.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.49.8.109.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
47.244.13.202 attackbotsspam
WEB SPAM:  
 
https://168cash.com.tw/
2020-02-13 13:33:23
218.92.0.208 attackspam
Feb 13 06:06:22 silence02 sshd[18454]: Failed password for root from 218.92.0.208 port 45463 ssh2
Feb 13 06:06:24 silence02 sshd[18454]: Failed password for root from 218.92.0.208 port 45463 ssh2
Feb 13 06:06:27 silence02 sshd[18454]: Failed password for root from 218.92.0.208 port 45463 ssh2
2020-02-13 13:16:26
45.148.10.99 attackspambots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-02-13 13:17:52
218.92.0.184 attackspam
Feb 12 23:30:03 askasleikir sshd[44524]: Failed password for root from 218.92.0.184 port 52753 ssh2
Feb 12 23:30:30 askasleikir sshd[44542]: Failed password for root from 218.92.0.184 port 24485 ssh2
Feb 12 23:30:25 askasleikir sshd[44542]: Failed password for root from 218.92.0.184 port 24485 ssh2
2020-02-13 13:48:27
103.231.94.151 attackspam
Port probing on unauthorized port 22
2020-02-13 13:13:26
222.186.180.223 attackspambots
Feb 13 06:21:52 nextcloud sshd\[2150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Feb 13 06:21:55 nextcloud sshd\[2150\]: Failed password for root from 222.186.180.223 port 53146 ssh2
Feb 13 06:21:58 nextcloud sshd\[2150\]: Failed password for root from 222.186.180.223 port 53146 ssh2
2020-02-13 13:25:49
222.186.173.183 attackbotsspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-02-13 13:48:01
45.94.174.30 attackspam
Automatic report - Port Scan Attack
2020-02-13 13:53:21
222.186.175.148 attack
Feb 13 06:27:45 legacy sshd[25609]: Failed password for root from 222.186.175.148 port 43568 ssh2
Feb 13 06:27:48 legacy sshd[25609]: Failed password for root from 222.186.175.148 port 43568 ssh2
Feb 13 06:27:52 legacy sshd[25609]: Failed password for root from 222.186.175.148 port 43568 ssh2
Feb 13 06:27:59 legacy sshd[25609]: error: maximum authentication attempts exceeded for root from 222.186.175.148 port 43568 ssh2 [preauth]
...
2020-02-13 13:31:38
116.109.33.59 attackspam
Feb 13 06:45:01 server sshd\[13683\]: Invalid user test from 116.109.33.59
Feb 13 06:45:01 server sshd\[13683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.109.33.59 
Feb 13 06:45:03 server sshd\[13683\]: Failed password for invalid user test from 116.109.33.59 port 57288 ssh2
Feb 13 07:54:59 server sshd\[24894\]: Invalid user test from 116.109.33.59
Feb 13 07:55:00 server sshd\[24894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.109.33.59 
...
2020-02-13 13:35:09
186.91.201.27 attack
1581569700 - 02/13/2020 05:55:00 Host: 186.91.201.27/186.91.201.27 Port: 445 TCP Blocked
2020-02-13 13:34:29
103.24.98.12 attackbotsspam
port scan and connect, tcp 22 (ssh)
2020-02-13 13:24:01
222.186.30.57 attackbotsspam
Feb 13 06:18:28 MK-Soft-VM5 sshd[507]: Failed password for root from 222.186.30.57 port 29323 ssh2
Feb 13 06:18:30 MK-Soft-VM5 sshd[507]: Failed password for root from 222.186.30.57 port 29323 ssh2
...
2020-02-13 13:21:11
49.235.69.80 attackbotsspam
Feb 13 05:55:05 MK-Soft-VM3 sshd[27822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.69.80 
Feb 13 05:55:07 MK-Soft-VM3 sshd[27822]: Failed password for invalid user plsql from 49.235.69.80 port 48924 ssh2
...
2020-02-13 13:24:59
49.236.195.48 attack
*Port Scan* detected from 49.236.195.48 (MY/Malaysia/-). 4 hits in the last 20 seconds
2020-02-13 13:19:14

Recently Reported IPs

8.213.203.247 251.131.2.110 77.141.206.21 202.177.101.114
202.247.128.239 6.147.13.66 204.127.133.196 111.150.90.174
204.198.162.209 206.142.0.240 204.247.124.233 205.138.200.219
205.141.211.254 205.227.221.158 243.122.88.224 32.223.95.66
128.5.150.35 208.164.158.138 208.172.247.201 209.157.176.117