Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ukraine

Internet Service Provider: UARNet

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
1590610242 - 05/27/2020 22:10:42 Host: 194.44.53.81/194.44.53.81 Port: 445 TCP Blocked
2020-05-28 07:59:06
attack
Unauthorised access (Dec  6) SRC=194.44.53.81 LEN=52 TTL=119 ID=26414 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-06 18:41:20
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.44.53.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.44.53.81.			IN	A

;; AUTHORITY SECTION:
.			259	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120600 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 06 18:41:13 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 81.53.44.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.53.44.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.185.70.254 attackspam
Dec 26 01:18:40 web1 postfix/smtpd[23990]: warning: unknown[61.185.70.254]: SASL LOGIN authentication failed: authentication failure
...
2019-12-26 22:51:09
103.55.91.51 attack
Invalid user billet from 103.55.91.51 port 54296
2019-12-26 22:55:12
51.91.212.81 attack
12/26/2019-15:54:40.334386 51.91.212.81 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 53
2019-12-26 23:00:47
163.172.204.185 attack
Unauthorized SSH login attempts
2019-12-26 22:54:03
88.190.69.125 attack
$f2bV_matches
2019-12-26 23:07:29
61.160.196.201 attackspambots
$f2bV_matches
2019-12-26 23:20:18
207.154.196.85 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-26 23:09:04
51.91.212.79 attack
12/26/2019-10:14:19.686864 51.91.212.79 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 52
2019-12-26 23:17:47
212.31.112.179 attackspam
Dec 26 15:38:15 areeb-Workstation sshd[14984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.31.112.179 
Dec 26 15:38:17 areeb-Workstation sshd[14984]: Failed password for invalid user pometisch from 212.31.112.179 port 35962 ssh2
...
2019-12-26 22:41:51
121.164.122.134 attackspambots
SSH auth scanning - multiple failed logins
2019-12-26 22:50:53
62.234.108.54 attackbotsspam
$f2bV_matches
2019-12-26 23:19:24
94.255.177.203 attack
$f2bV_matches
2019-12-26 23:01:51
121.79.131.234 attackbotsspam
Invalid user hung from 121.79.131.234 port 35186
2019-12-26 22:52:23
149.89.18.103 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-12-26 22:39:58
80.82.70.206 attackspam
$f2bV_matches
2019-12-26 23:11:43

Recently Reported IPs

49.233.92.166 187.162.139.127 124.13.202.153 186.224.238.229
89.38.145.90 93.84.170.130 129.204.2.182 59.9.48.26
37.45.123.160 212.83.139.174 183.136.121.50 101.109.0.106
140.249.55.35 182.135.63.227 182.95.176.176 222.252.45.133
49.233.87.107 77.220.48.163 154.127.255.162 188.165.193.140