Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Miami

Region: Florida

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.185.212.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.185.212.44.			IN	A

;; AUTHORITY SECTION:
.			343	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121602 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 17 04:34:21 CST 2019
;; MSG SIZE  rcvd: 118
Host info
44.212.185.104.in-addr.arpa domain name pointer 104-185-212-44.lightspeed.miamfl.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.212.185.104.in-addr.arpa	name = 104-185-212-44.lightspeed.miamfl.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.99.45.33 attackbots
Fail2Ban Ban Triggered
2020-09-01 02:53:30
72.255.54.37 attackbots
72.255.54.37 - - [31/Aug/2020:15:33:30 +0100] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
72.255.54.37 - - [31/Aug/2020:15:34:53 +0100] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
72.255.54.37 - - [31/Aug/2020:15:37:09 +0100] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-09-01 02:51:12
51.254.248.18 attackspam
Aug 31 16:18:27 dev0-dcde-rnet sshd[29195]: Failed password for root from 51.254.248.18 port 52444 ssh2
Aug 31 16:22:48 dev0-dcde-rnet sshd[29208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.248.18
Aug 31 16:22:50 dev0-dcde-rnet sshd[29208]: Failed password for invalid user gbc from 51.254.248.18 port 57364 ssh2
2020-09-01 02:49:18
125.19.38.238 attack
Unauthorized connection attempt from IP address 125.19.38.238 on Port 445(SMB)
2020-09-01 03:02:18
51.91.212.81 attackspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: ns3156319.ip-51-91-212.eu.
2020-09-01 02:41:49
203.205.37.233 attackspambots
"Unauthorized connection attempt on SSHD detected"
2020-09-01 02:32:17
138.36.2.184 attack
Unauthorized connection attempt from IP address 138.36.2.184 on Port 445(SMB)
2020-09-01 02:31:01
85.209.0.100 attack
SSHD brute force attack detected by fail2ban
2020-09-01 03:06:05
188.112.7.142 attackbots
(smtpauth) Failed SMTP AUTH login from 188.112.7.142 (PL/Poland/188-112-7-142.net.hawetelekom.pl): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-31 17:01:04 plain authenticator failed for 188-112-7-142.net.hawetelekom.pl [188.112.7.142]: 535 Incorrect authentication data (set_id=info@atlaspumpsepahan.com)
2020-09-01 02:36:14
74.82.47.58 attackbots
Port scan: Attack repeated for 24 hours
2020-09-01 03:04:06
85.209.0.102 attackbots
SSH Brute-Force detected
2020-09-01 02:31:32
89.248.169.94 attack
Port scan on 3 port(s): 5900 5904 5959
2020-09-01 02:34:00
200.105.221.147 attack
Invalid user hamza from 200.105.221.147 port 48877
2020-09-01 03:07:04
148.101.13.203 attackbotsspam
1598877055 - 08/31/2020 14:30:55 Host: 148.101.13.203/148.101.13.203 Port: 445 TCP Blocked
2020-09-01 02:46:47
20.49.163.178 attack
port scan and connect, tcp 22 (ssh)
2020-09-01 02:47:48

Recently Reported IPs

213.184.211.238 14.182.101.251 190.50.40.249 195.123.234.10
100.216.221.3 3.143.132.136 165.59.126.198 144.216.139.114
2.219.29.19 88.163.44.82 36.118.120.155 77.164.19.240
84.194.198.227 210.12.183.198 102.136.220.135 125.175.253.110
196.166.67.172 97.129.114.118 134.3.169.14 136.181.56.79