Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.1.100.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.1.100.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024123001 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 31 08:58:40 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 244.100.1.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.100.1.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.158.170.159 attack
2019-09-29 00:02:32
190.85.234.215 attackspambots
Feb  5 00:19:41 vtv3 sshd\[26816\]: Invalid user osmc from 190.85.234.215 port 34808
Feb  5 00:19:41 vtv3 sshd\[26816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.234.215
Feb  5 00:19:43 vtv3 sshd\[26816\]: Failed password for invalid user osmc from 190.85.234.215 port 34808 ssh2
Feb  5 00:24:22 vtv3 sshd\[28181\]: Invalid user ingrid from 190.85.234.215 port 38658
Feb  5 00:24:22 vtv3 sshd\[28181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.234.215
Feb  5 09:20:42 vtv3 sshd\[14885\]: Invalid user testsftp from 190.85.234.215 port 46106
Feb  5 09:20:42 vtv3 sshd\[14885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.234.215
Feb  5 09:20:44 vtv3 sshd\[14885\]: Failed password for invalid user testsftp from 190.85.234.215 port 46106 ssh2
Feb  5 09:25:28 vtv3 sshd\[16215\]: Invalid user zahid from 190.85.234.215 port 49832
Feb  5 09:25:28 vtv3 sshd\[
2019-09-29 00:04:50
222.186.175.167 attackbots
Sep 28 18:14:30 tux-35-217 sshd\[8653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Sep 28 18:14:32 tux-35-217 sshd\[8653\]: Failed password for root from 222.186.175.167 port 12066 ssh2
Sep 28 18:14:36 tux-35-217 sshd\[8653\]: Failed password for root from 222.186.175.167 port 12066 ssh2
Sep 28 18:14:40 tux-35-217 sshd\[8653\]: Failed password for root from 222.186.175.167 port 12066 ssh2
...
2019-09-29 00:19:35
13.127.208.96 attackbotsspam
WP_xmlrpc_attack
2019-09-29 00:00:38
209.235.23.125 attackspam
2019-09-28T13:03:11.035508abusebot-2.cloudsearch.cf sshd\[2108\]: Invalid user Password10 from 209.235.23.125 port 56342
2019-09-29 00:36:31
128.106.164.246 attack
Unauthorized connection attempt from IP address 128.106.164.246 on Port 445(SMB)
2019-09-29 00:10:33
142.93.238.162 attackspam
Automatic report - Banned IP Access
2019-09-29 00:34:06
87.164.118.128 attack
09/28/2019-14:31:51.629180 87.164.118.128 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 94
2019-09-29 00:17:15
213.135.239.146 attackbotsspam
Sep 28 14:24:11 ns3110291 sshd\[32065\]: Invalid user florisbela from 213.135.239.146
Sep 28 14:24:14 ns3110291 sshd\[32065\]: Failed password for invalid user florisbela from 213.135.239.146 port 4770 ssh2
Sep 28 14:28:00 ns3110291 sshd\[32182\]: Invalid user verdaccio from 213.135.239.146
Sep 28 14:28:02 ns3110291 sshd\[32182\]: Failed password for invalid user verdaccio from 213.135.239.146 port 10103 ssh2
Sep 28 14:31:50 ns3110291 sshd\[32354\]: Invalid user buenaventura from 213.135.239.146
...
2019-09-29 00:14:08
138.201.55.51 attack
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:51:56 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:52:28 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:53:00 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:53:31 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:54:03 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:54:35 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubun
2019-09-29 00:39:13
201.242.252.231 attackbots
Unauthorized connection attempt from IP address 201.242.252.231 on Port 445(SMB)
2019-09-29 00:14:55
104.42.158.117 attackbotsspam
Sep 28 14:31:18 ns41 sshd[23419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.158.117
2019-09-29 00:45:38
37.59.53.22 attack
Sep 28 18:24:23 MK-Soft-VM5 sshd[13699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.53.22 
Sep 28 18:24:26 MK-Soft-VM5 sshd[13699]: Failed password for invalid user spark04 from 37.59.53.22 port 51740 ssh2
...
2019-09-29 00:38:54
213.32.21.139 attackbotsspam
2019-09-28T15:50:27.954356hub.schaetter.us sshd\[14888\]: Invalid user ty_admin from 213.32.21.139 port 41358
2019-09-28T15:50:27.964403hub.schaetter.us sshd\[14888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.ip-213-32-21.eu
2019-09-28T15:50:29.772704hub.schaetter.us sshd\[14888\]: Failed password for invalid user ty_admin from 213.32.21.139 port 41358 ssh2
2019-09-28T15:59:11.076618hub.schaetter.us sshd\[14951\]: Invalid user openvpn from 213.32.21.139 port 40818
2019-09-28T15:59:11.085442hub.schaetter.us sshd\[14951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.ip-213-32-21.eu
...
2019-09-29 00:14:35
51.255.168.202 attackspambots
Sep 28 06:03:02 hanapaa sshd\[32019\]: Invalid user boavista from 51.255.168.202
Sep 28 06:03:02 hanapaa sshd\[32019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.ip-51-255-168.eu
Sep 28 06:03:05 hanapaa sshd\[32019\]: Failed password for invalid user boavista from 51.255.168.202 port 54234 ssh2
Sep 28 06:07:38 hanapaa sshd\[32430\]: Invalid user test from 51.255.168.202
Sep 28 06:07:38 hanapaa sshd\[32430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.ip-51-255-168.eu
2019-09-29 00:24:37

Recently Reported IPs

248.156.110.141 197.221.188.96 170.101.233.1 118.78.116.5
138.226.203.78 211.95.159.127 238.235.162.84 156.144.47.146
135.227.244.249 179.124.132.147 124.142.10.208 159.162.127.192
172.228.183.215 22.27.60.102 176.159.50.0 237.131.206.145
22.151.33.94 214.12.255.176 10.10.217.185 10.10.217.93