Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cary

Region: North Carolina

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.173.122.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.173.122.44.			IN	A

;; AUTHORITY SECTION:
.			577	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100102 1800 900 604800 86400

;; Query time: 504 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 02 03:22:19 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 44.122.173.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.122.173.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.191.60.199 attackbots
Aug 18 15:55:40 pkdns2 sshd\[4709\]: Invalid user backups from 94.191.60.199Aug 18 15:55:42 pkdns2 sshd\[4709\]: Failed password for invalid user backups from 94.191.60.199 port 48972 ssh2Aug 18 15:59:05 pkdns2 sshd\[4858\]: Invalid user stephanie from 94.191.60.199Aug 18 15:59:08 pkdns2 sshd\[4858\]: Failed password for invalid user stephanie from 94.191.60.199 port 49262 ssh2Aug 18 16:02:36 pkdns2 sshd\[5013\]: Invalid user boss from 94.191.60.199Aug 18 16:02:38 pkdns2 sshd\[5013\]: Failed password for invalid user boss from 94.191.60.199 port 49556 ssh2
...
2019-08-18 23:23:23
219.151.11.109 attack
Unauthorized connection attempt from IP address 219.151.11.109 on Port 445(SMB)
2019-08-18 22:20:24
49.68.105.224 attackspam
37215/tcp
[2019-08-18]1pkt
2019-08-18 22:10:00
191.235.93.236 attackspam
Aug 18 05:29:17 web9 sshd\[32244\]: Invalid user music from 191.235.93.236
Aug 18 05:29:17 web9 sshd\[32244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.93.236
Aug 18 05:29:19 web9 sshd\[32244\]: Failed password for invalid user music from 191.235.93.236 port 42306 ssh2
Aug 18 05:34:56 web9 sshd\[1226\]: Invalid user bug from 191.235.93.236
Aug 18 05:34:56 web9 sshd\[1226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.93.236
2019-08-18 23:45:01
36.72.223.249 attack
Unauthorized connection attempt from IP address 36.72.223.249 on Port 445(SMB)
2019-08-18 22:49:23
62.140.232.253 attackbots
Unauthorized connection attempt from IP address 62.140.232.253 on Port 445(SMB)
2019-08-18 23:42:09
54.36.149.62 attack
Automatic report - Banned IP Access
2019-08-19 00:06:01
178.62.41.7 attackspam
Aug 18 16:50:23 yabzik sshd[14824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.41.7
Aug 18 16:50:25 yabzik sshd[14824]: Failed password for invalid user insserver from 178.62.41.7 port 53596 ssh2
Aug 18 16:54:38 yabzik sshd[15971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.41.7
2019-08-18 21:57:47
69.176.95.240 attackbots
SSH/22 MH Probe, BF, Hack -
2019-08-18 22:39:46
104.236.37.116 attackspambots
Aug 18 17:23:13 v22019058497090703 sshd[9436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.37.116
Aug 18 17:23:15 v22019058497090703 sshd[9436]: Failed password for invalid user cgi from 104.236.37.116 port 33322 ssh2
Aug 18 17:27:37 v22019058497090703 sshd[9769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.37.116
...
2019-08-18 23:37:38
165.22.63.29 attack
Aug 18 05:46:19 auw2 sshd\[28700\]: Invalid user csgo from 165.22.63.29
Aug 18 05:46:19 auw2 sshd\[28700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.29
Aug 18 05:46:21 auw2 sshd\[28700\]: Failed password for invalid user csgo from 165.22.63.29 port 52700 ssh2
Aug 18 05:51:25 auw2 sshd\[29089\]: Invalid user opietri from 165.22.63.29
Aug 18 05:51:25 auw2 sshd\[29089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.29
2019-08-18 23:59:16
125.23.150.238 attackbotsspam
Unauthorized connection attempt from IP address 125.23.150.238 on Port 445(SMB)
2019-08-18 23:36:00
112.73.93.178 attackspambots
2019-08-18T14:06:46.541683abusebot-6.cloudsearch.cf sshd\[22340\]: Invalid user postgres from 112.73.93.178 port 57538
2019-08-19 00:12:15
151.80.211.75 attackbots
Aug 18 15:02:58 plex sshd[1502]: Invalid user informix from 151.80.211.75 port 46764
2019-08-18 22:52:23
93.158.161.119 attack
Russian porn bots,  IP: 93.158.161.119 Hostname: 93-158-161-119.spider.yandex.com
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)
2019-08-19 00:17:26

Recently Reported IPs

84.9.218.90 109.248.174.40 108.202.6.98 82.138.21.9
46.40.129.178 183.193.194.213 213.163.125.251 108.119.7.84
183.38.22.169 114.142.171.51 121.68.131.242 99.209.96.148
77.89.226.6 71.94.198.100 18.222.168.192 123.167.137.1
195.236.154.67 121.7.63.227 82.120.209.215 93.78.127.112