Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.216.44.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.216.44.81.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:58:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 81.44.216.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.44.216.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.71.139.98 attackbotsspam
Feb 14 07:56:26 pornomens sshd\[23957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.98  user=root
Feb 14 07:56:27 pornomens sshd\[23957\]: Failed password for root from 223.71.139.98 port 33066 ssh2
Feb 14 07:59:48 pornomens sshd\[23971\]: Invalid user lous from 223.71.139.98 port 54210
Feb 14 07:59:48 pornomens sshd\[23971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.98
...
2020-02-14 17:58:00
222.186.19.221 attackspam
Feb 14 10:38:27 debian-2gb-nbg1-2 kernel: \[3932332.752972\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=222.186.19.221 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=54321 PROTO=TCP SPT=33194 DPT=8443 WINDOW=65535 RES=0x00 SYN URGP=0
2020-02-14 17:43:13
117.200.198.203 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-02-14 17:47:46
175.209.241.33 attackspam
Feb 14 09:31:05 localhost sshd\[21914\]: Invalid user admin from 175.209.241.33 port 55723
Feb 14 09:31:06 localhost sshd\[21914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.209.241.33
Feb 14 09:31:07 localhost sshd\[21914\]: Failed password for invalid user admin from 175.209.241.33 port 55723 ssh2
...
2020-02-14 17:43:38
119.153.106.207 attack
Automatic report - Port Scan Attack
2020-02-14 18:24:10
84.109.248.104 attackbots
SSH login attempts.
2020-02-14 17:42:38
185.156.73.52 attack
02/14/2020-05:09:48.006793 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-14 18:11:02
119.237.157.159 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 17:44:12
61.5.29.69 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-14 17:55:42
119.236.167.146 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 18:08:41
88.247.186.179 attack
Automatic report - Port Scan Attack
2020-02-14 17:36:46
117.50.66.85 attackspambots
Port probing on unauthorized port 1433
2020-02-14 17:40:39
218.154.121.238 attackspambots
port scan and connect, tcp 81 (hosts2-ns)
2020-02-14 17:38:01
219.141.184.178 spamattack
Typical blackmail attempt. But instead of the usual "I have a video of you where you visit sex sites", now a new variant. "You mess around with other women and I get your messages from it." And then the usual: The deal is next. You make a donation of $ 950 worth in Bit Coln value. Otherwise, well ... your secret will not be a secret anymore. I created a special archive with some materials for your wife that will be delivered if I don`t get my donation. It took me some time to accumulate enough information. Whoever falls for such shit is to blame. And by the way, if the idiot blackmailer reads this ... I'm not married at all. The blackmail comes via a chinese server again: 183.60.83.19#53(183.60.83.19)
2020-02-14 17:49:18
110.153.79.138 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-14 18:12:48

Recently Reported IPs

105.216.43.4 105.216.43.58 105.216.43.226 105.216.43.222
105.216.44.182 101.17.28.61 105.216.43.22 255.63.251.47
105.216.45.254 105.216.45.204 105.216.45.81 105.216.45.49
105.216.46.172 105.216.45.58 105.216.46.205 105.216.46.199
105.216.46.194 101.178.0.210 105.216.45.53 105.216.46.255