Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.55.109.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.55.109.244.			IN	A

;; AUTHORITY SECTION:
.			208	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012600 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 26 17:59:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 244.109.55.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.55.109.244.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
58.186.100.77 attack
Unauthorized connection attempt from IP address 58.186.100.77 on Port 445(SMB)
2019-07-25 08:49:18
203.156.124.232 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-07-25 09:12:21
37.133.220.87 attackbots
2019-07-25T00:36:23.361805abusebot-7.cloudsearch.cf sshd\[22404\]: Invalid user tao from 37.133.220.87 port 48770
2019-07-25 08:57:00
182.18.171.148 attack
Invalid user tomcat from 182.18.171.148 port 51374
2019-07-25 08:38:31
206.189.129.55 attackspambots
xmlrpc attack
2019-07-25 08:55:59
185.36.81.55 attack
Scanning random ports - tries to find possible vulnerable services
2019-07-25 09:12:55
123.27.3.25 attackbots
Unauthorized connection attempt from IP address 123.27.3.25 on Port 445(SMB)
2019-07-25 08:47:01
197.250.228.39 attack
Unauthorized connection attempt from IP address 197.250.228.39 on Port 445(SMB)
2019-07-25 08:36:02
103.102.97.242 attackbots
Wed, 24 Jul 2019 20:48:31 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-25 08:27:22
79.170.202.194 attack
proto=tcp  .  spt=53669  .  dpt=25  .     (listed on Blocklist de  Jul 23)     (935)
2019-07-25 09:14:02
2.186.13.149 attack
Unauthorized connection attempt from IP address 2.186.13.149 on Port 445(SMB)
2019-07-25 09:15:45
109.153.52.232 attackbotsspam
Jul 24 21:43:56 vps sshd[16836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.153.52.232 
Jul 24 21:43:58 vps sshd[16836]: Failed password for invalid user audio from 109.153.52.232 port 55174 ssh2
Jul 24 21:58:39 vps sshd[17379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.153.52.232 
...
2019-07-25 08:52:47
88.247.139.213 attack
Unauthorized connection attempt from IP address 88.247.139.213 on Port 445(SMB)
2019-07-25 08:45:43
60.249.179.122 attackspam
WordPress brute force
2019-07-25 09:07:51
124.123.34.1 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-24 23:53:46,759 INFO [amun_request_handler] PortScan Detected on Port: 445 (124.123.34.1)
2019-07-25 08:47:53

Recently Reported IPs

94.51.9.101 50.95.212.219 7.179.55.98 37.169.11.118
26.247.130.189 179.65.252.98 154.126.250.167 8.245.237.173
134.161.20.90 4.144.86.248 136.44.246.210 248.20.92.75
234.175.105.104 32.158.183.237 154.231.186.145 127.92.91.48
232.101.195.93 113.201.93.173 1.180.194.100 191.120.96.254