Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.89.44.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.89.44.107.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 12:20:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 107.44.89.144.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.44.89.144.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.4.132 attackspam
Invalid user duke from 106.13.4.132 port 58170
2020-07-23 12:03:49
51.254.220.20 attack
2020-07-23T00:10:42.105074shield sshd\[20945\]: Invalid user informix from 51.254.220.20 port 51254
2020-07-23T00:10:42.111180shield sshd\[20945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-51-254-220.eu
2020-07-23T00:10:44.138359shield sshd\[20945\]: Failed password for invalid user informix from 51.254.220.20 port 51254 ssh2
2020-07-23T00:16:12.743361shield sshd\[22014\]: Invalid user xiaohui from 51.254.220.20 port 55940
2020-07-23T00:16:12.750369shield sshd\[22014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-51-254-220.eu
2020-07-23 08:22:11
94.30.52.253 attackbotsspam
Failed RDP login
2020-07-23 08:14:15
89.248.174.3 attackspambots
firewall-block, port(s): 8888/tcp
2020-07-23 08:26:20
75.132.124.22 attack
Port Scan detected!
...
2020-07-23 08:24:22
162.241.94.40 attackspam
Jul 23 00:54:48 debian-2gb-nbg1-2 kernel: \[17717016.456978\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=162.241.94.40 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=3279 PROTO=TCP SPT=48912 DPT=18791 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-23 08:21:32
113.214.25.170 attackbotsspam
Brute force attempt
2020-07-23 08:06:46
112.85.42.200 attackbots
Jul 23 07:00:35 ift sshd\[39362\]: Failed password for root from 112.85.42.200 port 55296 ssh2Jul 23 07:01:08 ift sshd\[39380\]: Failed password for root from 112.85.42.200 port 26880 ssh2Jul 23 07:01:19 ift sshd\[39380\]: Failed password for root from 112.85.42.200 port 26880 ssh2Jul 23 07:01:22 ift sshd\[39380\]: Failed password for root from 112.85.42.200 port 26880 ssh2Jul 23 07:01:26 ift sshd\[39380\]: Failed password for root from 112.85.42.200 port 26880 ssh2
...
2020-07-23 12:06:06
13.75.160.204 attackbots
Jul 23 05:49:14 itv-usvr-01 sshd[5406]: Invalid user postgres from 13.75.160.204
Jul 23 05:49:14 itv-usvr-01 sshd[5406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.75.160.204
Jul 23 05:49:14 itv-usvr-01 sshd[5406]: Invalid user postgres from 13.75.160.204
Jul 23 05:49:16 itv-usvr-01 sshd[5406]: Failed password for invalid user postgres from 13.75.160.204 port 53396 ssh2
Jul 23 05:54:45 itv-usvr-01 sshd[6061]: Invalid user student from 13.75.160.204
2020-07-23 08:33:58
112.85.42.229 attackbotsspam
Jul 23 05:58:56 home sshd[232650]: Failed password for root from 112.85.42.229 port 41976 ssh2
Jul 23 05:59:00 home sshd[232650]: Failed password for root from 112.85.42.229 port 41976 ssh2
Jul 23 05:59:04 home sshd[232650]: Failed password for root from 112.85.42.229 port 41976 ssh2
Jul 23 05:59:39 home sshd[232743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229  user=root
Jul 23 05:59:40 home sshd[232743]: Failed password for root from 112.85.42.229 port 17606 ssh2
...
2020-07-23 12:02:17
99.17.246.167 attack
Jul 23 05:59:40 sso sshd[12957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.17.246.167
Jul 23 05:59:43 sso sshd[12957]: Failed password for invalid user ramesh from 99.17.246.167 port 36178 ssh2
...
2020-07-23 12:01:15
182.71.192.57 attackspam
1595458486 - 07/23/2020 00:54:46 Host: 182.71.192.57/182.71.192.57 Port: 445 TCP Blocked
2020-07-23 08:28:17
80.211.185.217 attackbots
Distributed brute force attack
2020-07-23 08:05:37
113.184.216.175 attackbots
Unauthorised access (Jul 23) SRC=113.184.216.175 LEN=52 TTL=112 ID=26546 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-23 12:05:34
171.231.245.184 attackbotsspam
Failed RDP login
2020-07-23 08:28:37

Recently Reported IPs

96.45.207.39 41.19.112.219 150.98.18.133 69.213.151.230
241.194.56.35 58.169.249.194 250.27.123.101 166.254.82.167
84.64.191.23 115.84.47.224 218.158.250.178 214.168.126.48
163.145.172.41 79.208.161.129 154.131.114.204 148.206.40.238
28.181.113.236 165.136.119.116 240.165.118.202 246.69.64.179