Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.228.144.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.228.144.8.			IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 18:07:04 CST 2022
;; MSG SIZE  rcvd: 106
Host info
8.144.228.109.in-addr.arpa domain name pointer h-109-228-144-8.A463.priv.bahnhof.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.144.228.109.in-addr.arpa	name = h-109-228-144-8.A463.priv.bahnhof.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.54.160.21 attackbotsspam
Port scan: Attack repeated for 24 hours 195.54.160.21 - - [12/Jul/2020:19:23:08 +0300] "GET /solr/admin/info/system?wt=json HTTP/1.1" 404 456 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
195.54.160.21 - - [12/Jul/2020:19:24:37 +0300] "GET /?XDEBUG_SESSION_START=phpstorm HTTP/1.1" 200 475 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
2020-07-22 04:53:07
140.143.228.18 attackspam
(sshd) Failed SSH login from 140.143.228.18 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 21 18:17:30 amsweb01 sshd[23381]: Invalid user paci from 140.143.228.18 port 44284
Jul 21 18:17:32 amsweb01 sshd[23381]: Failed password for invalid user paci from 140.143.228.18 port 44284 ssh2
Jul 21 18:22:30 amsweb01 sshd[24235]: Invalid user rot from 140.143.228.18 port 32870
Jul 21 18:22:32 amsweb01 sshd[24235]: Failed password for invalid user rot from 140.143.228.18 port 32870 ssh2
Jul 21 18:25:46 amsweb01 sshd[24809]: Invalid user ec2-user from 140.143.228.18 port 35972
2020-07-22 05:15:40
24.37.113.22 attack
24.37.113.22 - - [21/Jul/2020:17:10:11 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
24.37.113.22 - - [21/Jul/2020:17:10:13 +0100] "POST /wp-login.php HTTP/1.1" 200 1890 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
24.37.113.22 - - [21/Jul/2020:17:10:15 +0100] "POST /wp-login.php HTTP/1.1" 200 1887 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-22 05:14:16
71.163.146.97 attackbots
Jul 21 23:03:12 piServer sshd[15184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.163.146.97 
Jul 21 23:03:14 piServer sshd[15184]: Failed password for invalid user mani from 71.163.146.97 port 58216 ssh2
Jul 21 23:07:26 piServer sshd[15462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.163.146.97 
...
2020-07-22 05:10:03
106.75.214.72 attackspambots
Jul 21 23:04:33 ns382633 sshd\[19177\]: Invalid user linux from 106.75.214.72 port 40878
Jul 21 23:04:33 ns382633 sshd\[19177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.214.72
Jul 21 23:04:36 ns382633 sshd\[19177\]: Failed password for invalid user linux from 106.75.214.72 port 40878 ssh2
Jul 21 23:10:00 ns382633 sshd\[20340\]: Invalid user postgres from 106.75.214.72 port 40700
Jul 21 23:10:00 ns382633 sshd\[20340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.214.72
2020-07-22 05:22:51
37.200.70.25 attack
2020-07-21T21:50:31+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-07-22 05:12:12
80.212.243.221 attack
Automatic report - Port Scan Attack
2020-07-22 05:01:54
3.7.67.254 attackbotsspam
Invalid user firenze from 3.7.67.254 port 42046
2020-07-22 05:12:48
139.220.192.57 attack
firewall-block, port(s): 22/tcp
2020-07-22 05:24:07
138.68.148.177 attackspam
Jul 21 20:52:31 hosting sshd[12465]: Invalid user ro from 138.68.148.177 port 42538
...
2020-07-22 05:08:56
106.12.200.239 attack
2020-07-21T22:16:05+0200 Failed SSH Authentication/Brute Force Attack. (Server 10)
2020-07-22 05:09:46
114.67.113.90 attackspambots
Repeated brute force against a port
2020-07-22 05:20:24
195.72.251.50 attack
Unauthorized connection attempt detected from IP address 195.72.251.50 to port 445 [T]
2020-07-22 04:52:29
173.205.13.236 attackspam
2020-07-22T04:13:39.783732hostname sshd[4850]: Invalid user gengjiao from 173.205.13.236 port 39622
2020-07-22T04:13:41.922938hostname sshd[4850]: Failed password for invalid user gengjiao from 173.205.13.236 port 39622 ssh2
2020-07-22T04:21:46.944042hostname sshd[8735]: Invalid user dp from 173.205.13.236 port 39301
...
2020-07-22 05:27:02
174.219.146.52 attack
Brute forcing email accounts
2020-07-22 05:07:57

Recently Reported IPs

109.228.137.11 109.228.125.19 109.228.139.144 109.228.156.104
109.228.37.184 109.228.168.228 109.228.207.23 109.228.51.230
109.228.53.159 109.228.51.136 109.228.252.5 109.228.37.95
109.228.50.234 109.228.55.95 109.228.52.223 109.228.253.199
109.228.54.209 109.228.53.235 109.229.0.10 109.228.66.77