Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.44.214.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48899
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.44.214.100.			IN	A

;; AUTHORITY SECTION:
.			343	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112700 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 27 21:04:52 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 100.214.44.1.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 100.214.44.1.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
150.109.196.143 attackbots
Jul  7 08:04:53 dev sshd\[14109\]: Invalid user teste from 150.109.196.143 port 39016
Jul  7 08:04:53 dev sshd\[14109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.196.143
...
2019-07-07 21:14:14
89.46.105.196 attackspam
07.07.2019 05:38:12 - Wordpress fail 
Detected by ELinOX-ALM
2019-07-07 21:34:45
177.129.204.57 attackbots
SMTP-sasl brute force
...
2019-07-07 21:28:53
121.122.28.221 attackbotsspam
SSH Bruteforce Attack
2019-07-07 21:03:07
45.119.83.62 attack
SSH Brute-Force attacks
2019-07-07 21:43:08
185.215.234.242 attackspam
19/7/7@09:47:49: FAIL: IoT-Telnet address from=185.215.234.242
...
2019-07-07 21:58:39
40.127.106.50 attackspambots
Jul  7 09:07:16 lnxmail61 sshd[8151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.106.50
2019-07-07 21:14:50
37.202.66.185 attackspambots
[portscan] tcp/23 [TELNET]
[scan/connect: 3 time(s)]
*(RWIN=60871)(07070954)
2019-07-07 21:49:46
104.236.22.133 attack
SSH Brute-Forcing (ownc)
2019-07-07 21:32:48
118.25.55.87 attack
Jul  7 05:32:48 vserver sshd\[9634\]: Failed password for root from 118.25.55.87 port 51140 ssh2Jul  7 05:35:40 vserver sshd\[9645\]: Invalid user renato from 118.25.55.87Jul  7 05:35:42 vserver sshd\[9645\]: Failed password for invalid user renato from 118.25.55.87 port 46676 ssh2Jul  7 05:38:39 vserver sshd\[9659\]: Invalid user ivo from 118.25.55.87
...
2019-07-07 21:24:15
45.71.201.10 attackbots
2019-07-07T04:58:10.163822abusebot-6.cloudsearch.cf sshd\[10569\]: Invalid user pi from 45.71.201.10 port 40860
2019-07-07 21:17:22
107.172.255.143 attackspam
Registration form abuse
2019-07-07 21:56:17
213.32.122.83 attackspam
Jul  7 06:27:11 62-210-73-4 proftpd\[30835\]: 0.0.0.0 \(213.32.122.83\[213.32.122.83\]\) - USER anonymous: no such user found from 213.32.122.83 \[213.32.122.83\] to 62.210.73.4:21
...
2019-07-07 21:12:49
77.247.108.131 attack
Jul  7 10:39:11 mail kernel: [1295069.532489] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=77.247.108.131 DST=77.73.69.240 LEN=442 TOS=0x08 PREC=0x20 TTL=55 ID=36584 DF PROTO=UDP SPT=5449 DPT=3090 LEN=422 
Jul  7 10:39:11 mail kernel: [1295069.532549] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=77.247.108.131 DST=77.73.69.240 LEN=444 TOS=0x08 PREC=0x20 TTL=55 ID=36585 DF PROTO=UDP SPT=5449 DPT=3100 LEN=424 
Jul  7 10:39:11 mail kernel: [1295069.532564] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=77.247.108.131 DST=77.73.69.240 LEN=441 TOS=0x08 PREC=0x20 TTL=55 ID=36586 DF PROTO=UDP SPT=5449 DPT=3110 LEN=421 
Jul  7 10:39:11 mail kernel: [1295069.532583] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=77.247.108.131 DST=77.73.69.240 LEN=443 TOS=0x08 PREC=0x20 TTL=55 ID=36587 DF PROTO=UDP SPT=5449 DPT=3120 LEN=423 
Jul  7 10:39:11 mail kernel: [1295069.532682] [UFW BLOCK] IN=eth0 OUT= MAC=00:16
2019-07-07 21:49:02
112.94.2.65 attackspam
Jul  7 14:30:17 meumeu sshd[22817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.94.2.65 
Jul  7 14:30:18 meumeu sshd[22817]: Failed password for invalid user event from 112.94.2.65 port 9313 ssh2
Jul  7 14:33:29 meumeu sshd[23175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.94.2.65 
...
2019-07-07 21:27:46

Recently Reported IPs

1.45.22.217 1.43.170.74 1.43.63.164 1.43.178.132
1.43.57.243 1.45.43.26 1.43.110.184 1.41.85.48
1.43.101.87 1.43.107.206 1.41.56.28 1.41.9.23
1.41.96.235 1.41.101.172 1.43.13.100 1.43.103.143
1.41.199.237 1.45.36.182 1.40.62.89 1.41.175.163