Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.94.149.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.94.149.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022701 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 02:21:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 44.149.94.198.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.149.94.198.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.189.30.73 attack
Brute force SMTP login attempted.
...
2019-10-16 14:00:16
89.97.196.18 attack
scan z
2019-10-16 13:56:42
118.163.111.221 attackbotsspam
2019-10-16T11:02:59.496787enmeeting.mahidol.ac.th sshd\[1505\]: Invalid user ftpuser from 118.163.111.221 port 60594
2019-10-16T11:02:59.517941enmeeting.mahidol.ac.th sshd\[1505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118-163-111-221.hinet-ip.hinet.net
2019-10-16T11:03:01.119387enmeeting.mahidol.ac.th sshd\[1505\]: Failed password for invalid user ftpuser from 118.163.111.221 port 60594 ssh2
...
2019-10-16 13:19:36
203.128.242.166 attackspam
Automatic report - SSH Brute-Force Attack
2019-10-16 13:53:01
200.196.249.170 attackspam
2019-10-16T07:42:05.242577scmdmz1 sshd\[13688\]: Invalid user 123couchdb from 200.196.249.170 port 52440
2019-10-16T07:42:05.245135scmdmz1 sshd\[13688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.249.170
2019-10-16T07:42:07.042403scmdmz1 sshd\[13688\]: Failed password for invalid user 123couchdb from 200.196.249.170 port 52440 ssh2
...
2019-10-16 13:48:52
117.63.192.42 attackspam
Oct 15 23:23:05 esmtp postfix/smtpd[7782]: lost connection after AUTH from unknown[117.63.192.42]
Oct 15 23:23:07 esmtp postfix/smtpd[7782]: lost connection after AUTH from unknown[117.63.192.42]
Oct 15 23:23:08 esmtp postfix/smtpd[8011]: lost connection after AUTH from unknown[117.63.192.42]
Oct 15 23:23:08 esmtp postfix/smtpd[7782]: lost connection after AUTH from unknown[117.63.192.42]
Oct 15 23:23:10 esmtp postfix/smtpd[7782]: lost connection after AUTH from unknown[117.63.192.42]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.63.192.42
2019-10-16 14:03:12
121.119.137.74 attackbots
Unauthorized connection attempt from IP address 121.119.137.74 on Port 445(SMB)
2019-10-16 13:24:11
18.139.97.31 attackbots
(sshd) Failed SSH login from 18.139.97.31 (SG/Singapore/ec2-18-139-97-31.ap-southeast-1.compute.amazonaws.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 16 06:44:29 server2 sshd[14905]: Failed password for root from 18.139.97.31 port 39336 ssh2
Oct 16 06:56:06 server2 sshd[15162]: Invalid user dnsftp from 18.139.97.31 port 45314
Oct 16 06:56:08 server2 sshd[15162]: Failed password for invalid user dnsftp from 18.139.97.31 port 45314 ssh2
Oct 16 07:01:23 server2 sshd[15298]: Failed password for root from 18.139.97.31 port 57608 ssh2
Oct 16 07:06:14 server2 sshd[15387]: Invalid user dirmngr from 18.139.97.31 port 41718
2019-10-16 13:42:32
218.27.204.33 attack
Oct 16 09:58:01 microserver sshd[24614]: Invalid user toby from 218.27.204.33 port 33036
Oct 16 09:58:01 microserver sshd[24614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.27.204.33
Oct 16 09:58:03 microserver sshd[24614]: Failed password for invalid user toby from 218.27.204.33 port 33036 ssh2
Oct 16 10:03:25 microserver sshd[25309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.27.204.33  user=root
Oct 16 10:03:26 microserver sshd[25309]: Failed password for root from 218.27.204.33 port 40504 ssh2
2019-10-16 14:04:56
31.179.183.30 attackbots
Oct 16 07:52:42 mout sshd[11217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.179.183.30  user=root
Oct 16 07:52:44 mout sshd[11217]: Failed password for root from 31.179.183.30 port 47974 ssh2
2019-10-16 14:05:14
2600:380:5459:d063:c0da:bc2f:f6a0:37d attackspambots
hacked into my phone and email.  deactivated email.  help
2019-10-16 13:23:48
35.199.154.128 attackbots
SSHScan
2019-10-16 13:40:22
35.246.180.177 attackspam
Oct 16 07:46:42 MK-Soft-Root1 sshd[26598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.246.180.177 
Oct 16 07:46:43 MK-Soft-Root1 sshd[26598]: Failed password for invalid user cssserver from 35.246.180.177 port 34204 ssh2
...
2019-10-16 13:51:02
210.221.220.68 attackbots
Oct 16 06:32:19 root sshd[9931]: Failed password for root from 210.221.220.68 port 36704 ssh2
Oct 16 06:36:44 root sshd[9966]: Failed password for root from 210.221.220.68 port 39216 ssh2
...
2019-10-16 13:21:26
187.135.241.106 attackspambots
Unauthorized connection attempt from IP address 187.135.241.106 on Port 445(SMB)
2019-10-16 13:17:49

Recently Reported IPs

43.163.85.105 152.123.168.222 246.100.240.158 215.85.239.101
175.253.208.252 161.203.255.92 147.29.160.37 186.227.24.91
85.113.41.109 8.173.180.199 188.137.95.161 166.173.222.244
124.138.180.200 219.236.110.195 177.46.193.30 209.200.175.105
81.13.166.140 153.133.191.91 12.19.82.189 197.77.238.57