Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: Tele2

Hostname: unknown

Organization: TELE2

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.187.221.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17417
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;83.187.221.55.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 21 00:04:49 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 55.221.187.83.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 55.221.187.83.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
27.72.147.96 attack
Unauthorized connection attempt from IP address 27.72.147.96 on Port 445(SMB)
2020-06-06 17:11:00
182.140.233.162 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-06-06 16:56:01
42.116.120.6 attackspam
Unauthorized connection attempt from IP address 42.116.120.6 on Port 445(SMB)
2020-06-06 17:06:39
116.247.81.99 attackbots
Jun  6 11:03:21 ift sshd\[47213\]: Failed password for root from 116.247.81.99 port 39770 ssh2Jun  6 11:07:17 ift sshd\[47848\]: Invalid user 123\r from 116.247.81.99Jun  6 11:07:19 ift sshd\[47848\]: Failed password for invalid user 123\r from 116.247.81.99 port 57113 ssh2Jun  6 11:11:08 ift sshd\[48349\]: Invalid user orlando123\r from 116.247.81.99Jun  6 11:11:10 ift sshd\[48349\]: Failed password for invalid user orlando123\r from 116.247.81.99 port 46224 ssh2
...
2020-06-06 16:54:16
119.45.36.52 attack
IDS admin
2020-06-06 16:45:05
142.93.202.159 attack
Jun  6 09:46:53 vps333114 sshd[26505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.202.159  user=root
Jun  6 09:46:54 vps333114 sshd[26505]: Failed password for root from 142.93.202.159 port 42794 ssh2
...
2020-06-06 16:59:13
113.125.16.234 attackspam
SSH Brute-Forcing (server2)
2020-06-06 16:58:02
106.13.230.238 attackspam
Jun  6 10:26:53 buvik sshd[18790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.238
Jun  6 10:26:56 buvik sshd[18790]: Failed password for invalid user jw!@#123\r from 106.13.230.238 port 58804 ssh2
Jun  6 10:28:38 buvik sshd[19002]: Invalid user pa$$w0rd123\r from 106.13.230.238
...
2020-06-06 16:42:43
54.37.153.80 attackspam
Jun  6 10:31:21 ns37 sshd[25580]: Failed password for root from 54.37.153.80 port 60258 ssh2
Jun  6 10:37:21 ns37 sshd[25908]: Failed password for root from 54.37.153.80 port 35910 ssh2
2020-06-06 16:55:22
5.123.105.11 attackbotsspam
Unauthorized connection attempt from IP address 5.123.105.11 on Port 445(SMB)
2020-06-06 17:14:38
222.186.173.142 attackbots
2020-06-06T11:12:52.067896ns386461 sshd\[21455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
2020-06-06T11:12:54.436724ns386461 sshd\[21455\]: Failed password for root from 222.186.173.142 port 57066 ssh2
2020-06-06T11:12:57.803388ns386461 sshd\[21455\]: Failed password for root from 222.186.173.142 port 57066 ssh2
2020-06-06T11:13:00.382518ns386461 sshd\[21455\]: Failed password for root from 222.186.173.142 port 57066 ssh2
2020-06-06T11:13:04.244700ns386461 sshd\[21455\]: Failed password for root from 222.186.173.142 port 57066 ssh2
...
2020-06-06 17:17:08
62.219.140.186 attackbots
Automatic report - Banned IP Access
2020-06-06 17:09:53
128.199.73.213 attackspam
 TCP (SYN) 128.199.73.213:54218 -> port 11836, len 44
2020-06-06 16:41:48
222.186.175.215 attackbotsspam
Jun  6 10:42:35 vmd48417 sshd[25507]: Failed password for root from 222.186.175.215 port 15780 ssh2
2020-06-06 16:47:52
115.159.196.214 attackbots
Jun  6 05:51:20 h2646465 sshd[16723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.196.214  user=root
Jun  6 05:51:22 h2646465 sshd[16723]: Failed password for root from 115.159.196.214 port 54026 ssh2
Jun  6 06:01:50 h2646465 sshd[17763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.196.214  user=root
Jun  6 06:01:53 h2646465 sshd[17763]: Failed password for root from 115.159.196.214 port 51236 ssh2
Jun  6 06:06:42 h2646465 sshd[18062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.196.214  user=root
Jun  6 06:06:44 h2646465 sshd[18062]: Failed password for root from 115.159.196.214 port 45590 ssh2
Jun  6 06:11:18 h2646465 sshd[18412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.196.214  user=root
Jun  6 06:11:20 h2646465 sshd[18412]: Failed password for root from 115.159.196.214 port 39934 ssh2
Jun  6 06:16
2020-06-06 16:59:30

Recently Reported IPs

206.84.185.172 95.78.143.57 8.174.160.165 32.157.25.0
201.178.47.2 194.165.132.194 175.251.235.205 172.112.1.136
31.172.57.126 66.233.198.59 98.184.162.142 13.91.136.187
200.206.177.42 143.18.216.26 44.245.156.191 12.231.213.200
125.236.156.175 68.255.113.228 37.250.11.227 157.108.223.167