Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.44.104.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1898
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.44.104.168.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:41:27 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 168.104.44.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.104.44.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.167 attackspambots
10/12/2019-18:35:47.694466 222.186.175.167 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-13 06:40:26
185.49.93.112 attackspam
Unauthorized IMAP connection attempt
2019-10-13 06:26:59
106.51.80.198 attackspambots
Oct 13 00:35:14 meumeu sshd[14828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198 
Oct 13 00:35:15 meumeu sshd[14828]: Failed password for invalid user 789uiojkl from 106.51.80.198 port 50176 ssh2
Oct 13 00:39:27 meumeu sshd[15435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198 
...
2019-10-13 06:42:05
162.243.158.198 attackbots
$f2bV_matches
2019-10-13 06:19:58
107.170.76.170 attackbotsspam
Oct 13 01:23:13 server sshd\[7483\]: User root from 107.170.76.170 not allowed because listed in DenyUsers
Oct 13 01:23:13 server sshd\[7483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.76.170  user=root
Oct 13 01:23:15 server sshd\[7483\]: Failed password for invalid user root from 107.170.76.170 port 33867 ssh2
Oct 13 01:29:42 server sshd\[16203\]: User root from 107.170.76.170 not allowed because listed in DenyUsers
Oct 13 01:29:42 server sshd\[16203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.76.170  user=root
2019-10-13 06:46:56
178.137.16.19 attackbotsspam
2019-10-13T00:29:36.945119hz01.yumiweb.com sshd\[2474\]: Invalid user admin from 178.137.16.19 port 11832
2019-10-13T00:29:37.391400hz01.yumiweb.com sshd\[2476\]: Invalid user admin from 178.137.16.19 port 11938
2019-10-13T00:29:37.750804hz01.yumiweb.com sshd\[2478\]: Invalid user admin from 178.137.16.19 port 12011
...
2019-10-13 06:52:44
13.112.153.248 attackspambots
WordPress brute force
2019-10-13 06:23:21
138.68.93.14 attackspambots
Oct 13 00:41:14 OPSO sshd\[7615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14  user=root
Oct 13 00:41:16 OPSO sshd\[7615\]: Failed password for root from 138.68.93.14 port 40492 ssh2
Oct 13 00:45:04 OPSO sshd\[8360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14  user=root
Oct 13 00:45:06 OPSO sshd\[8360\]: Failed password for root from 138.68.93.14 port 52000 ssh2
Oct 13 00:49:04 OPSO sshd\[8731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14  user=root
2019-10-13 06:49:51
49.88.112.113 attack
Oct 12 18:45:00 plusreed sshd[18512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Oct 12 18:45:02 plusreed sshd[18512]: Failed password for root from 49.88.112.113 port 51906 ssh2
...
2019-10-13 06:54:41
189.120.135.242 attackspam
2019-10-12T20:51:19.385058abusebot-5.cloudsearch.cf sshd\[28709\]: Invalid user telnet from 189.120.135.242 port 43611
2019-10-13 06:26:24
167.71.234.130 attackspam
167.71.234.130 - - [12/Oct/2019:19:28:59 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.234.130 - - [12/Oct/2019:19:29:01 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.234.130 - - [12/Oct/2019:19:29:01 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.234.130 - - [12/Oct/2019:19:29:02 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.234.130 - - [12/Oct/2019:19:29:03 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.234.130 - - [12/Oct/2019:19:29:04 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-10-13 06:24:18
113.172.214.48 attackbots
19/10/12@18:29:37: FAIL: IoT-SSH address from=113.172.214.48
...
2019-10-13 06:50:22
23.99.176.168 attackspambots
Automatic report - Banned IP Access
2019-10-13 06:40:11
187.63.73.56 attackspam
2019-10-12T16:46:42.925788shield sshd\[5164\]: Invalid user Bacon2017 from 187.63.73.56 port 34640
2019-10-12T16:46:42.931998shield sshd\[5164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.63.73.56
2019-10-12T16:46:44.953490shield sshd\[5164\]: Failed password for invalid user Bacon2017 from 187.63.73.56 port 34640 ssh2
2019-10-12T16:51:52.922014shield sshd\[6002\]: Invalid user Testing@2017 from 187.63.73.56 port 46062
2019-10-12T16:51:52.927812shield sshd\[6002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.63.73.56
2019-10-13 06:15:23
132.248.192.9 attack
Oct 12 17:40:53 localhost sshd\[12897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.192.9  user=root
Oct 12 17:40:56 localhost sshd\[12897\]: Failed password for root from 132.248.192.9 port 41520 ssh2
Oct 12 17:54:41 localhost sshd\[13108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.192.9  user=root
...
2019-10-13 06:16:28

Recently Reported IPs

14.37.157.3 14.36.233.113 14.43.225.174 14.45.185.213
14.45.223.205 14.46.214.131 14.44.51.51 14.46.140.89
14.45.66.209 14.47.221.158 14.47.118.86 14.45.188.62
14.48.200.90 14.48.205.15 14.47.218.111 14.5.211.72
14.49.90.103 14.50.134.125 14.49.152.233 14.51.79.155