Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.154.109.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56878
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;185.154.109.44.			IN	A

;; AUTHORITY SECTION:
.			431	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091402 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 09:56:05 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 44.109.154.185.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.109.154.185.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.9.46.177 attackspambots
Dec 18 10:37:46 mail sshd[14896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.46.177 
Dec 18 10:37:48 mail sshd[14896]: Failed password for invalid user flavor from 1.9.46.177 port 57637 ssh2
Dec 18 10:44:27 mail sshd[16102]: Failed password for backup from 1.9.46.177 port 60235 ssh2
2019-12-18 17:49:33
112.85.42.180 attack
W /var/ossec/active-response/bin/rep.py,add,-,112.85.42.180,1576660234.379392,5701,/var/log/auth.log,-,-
2019-12-18 17:39:52
50.197.210.138 attackspam
Dec 18 08:02:07  exim[30813]: [1\47] 1ihTLQ-00080z-68 H=50-197-210-138-static.hfc.comcastbusiness.net [50.197.210.138] F= rejected after DATA: This message scored 16.0 spam points.
2019-12-18 17:54:19
213.32.92.57 attackbots
Dec 18 11:33:17 sauna sshd[23771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.92.57
Dec 18 11:33:19 sauna sshd[23771]: Failed password for invalid user skjold from 213.32.92.57 port 51616 ssh2
...
2019-12-18 17:41:36
125.42.24.135 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-12-18 17:47:43
45.136.108.155 attackbotsspam
Dec 18 10:00:19 h2177944 kernel: \[9534603.514907\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.155 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=24566 PROTO=TCP SPT=46617 DPT=205 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 18 10:07:35 h2177944 kernel: \[9535039.290724\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.155 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=30728 PROTO=TCP SPT=46617 DPT=715 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 18 10:18:42 h2177944 kernel: \[9535706.240494\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.155 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=20574 PROTO=TCP SPT=46617 DPT=1365 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 18 10:32:23 h2177944 kernel: \[9536527.127806\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.155 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=7977 PROTO=TCP SPT=46617 DPT=408 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 18 10:47:00 h2177944 kernel: \[9537404.464724\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.155 DST=85.214.117.
2019-12-18 18:01:10
88.228.199.146 attackbots
Honeypot attack, port: 23, PTR: 88.228.199.146.dynamic.ttnet.com.tr.
2019-12-18 17:44:21
177.125.61.67 attackspambots
Honeypot attack, port: 445, PTR: static.177-125-61-67.nwt.net.br.
2019-12-18 17:59:20
180.76.233.148 attackbots
Invalid user admin from 180.76.233.148 port 46768
2019-12-18 17:32:52
52.186.168.121 attack
Dec 17 20:23:15 wbs sshd\[25451\]: Invalid user webmaster from 52.186.168.121
Dec 17 20:23:15 wbs sshd\[25451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.186.168.121
Dec 17 20:23:16 wbs sshd\[25451\]: Failed password for invalid user webmaster from 52.186.168.121 port 42258 ssh2
Dec 17 20:28:13 wbs sshd\[25901\]: Invalid user fagerland from 52.186.168.121
Dec 17 20:28:13 wbs sshd\[25901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.186.168.121
2019-12-18 17:35:30
147.139.135.52 attackbotsspam
$f2bV_matches
2019-12-18 17:57:32
106.13.48.157 attackspambots
Dec 18 08:05:14 OPSO sshd\[30967\]: Invalid user borys from 106.13.48.157 port 38296
Dec 18 08:05:14 OPSO sshd\[30967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.157
Dec 18 08:05:16 OPSO sshd\[30967\]: Failed password for invalid user borys from 106.13.48.157 port 38296 ssh2
Dec 18 08:12:08 OPSO sshd\[31864\]: Invalid user gpkaff from 106.13.48.157 port 35924
Dec 18 08:12:08 OPSO sshd\[31864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.157
2019-12-18 17:54:01
180.76.179.194 attackspambots
$f2bV_matches
2019-12-18 18:07:55
121.164.107.10 attackspam
Dec 18 10:40:38 MK-Soft-VM5 sshd[13420]: Failed password for root from 121.164.107.10 port 38510 ssh2
Dec 18 10:46:49 MK-Soft-VM5 sshd[13521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.164.107.10 
...
2019-12-18 17:58:07
221.155.106.19 attackspambots
Dec 17 21:32:28 web9 sshd\[32408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.155.106.19  user=root
Dec 17 21:32:30 web9 sshd\[32408\]: Failed password for root from 221.155.106.19 port 36298 ssh2
Dec 17 21:38:58 web9 sshd\[965\]: Invalid user admin from 221.155.106.19
Dec 17 21:38:58 web9 sshd\[965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.155.106.19
Dec 17 21:38:59 web9 sshd\[965\]: Failed password for invalid user admin from 221.155.106.19 port 44276 ssh2
2019-12-18 18:04:28

Recently Reported IPs

73.107.87.194 14.237.64.140 110.85.98.106 193.203.9.221
103.221.220.249 121.140.221.15 23.99.137.99 119.28.17.17
20.118.164.244 36.72.215.238 125.32.151.42 166.88.122.117
154.201.42.66 154.72.171.98 45.192.146.161 130.61.169.203
45.140.205.64 111.224.209.41 114.175.99.145 89.22.201.215