Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Colombia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.21.34.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58524
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.21.34.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 14:05:08 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 44.34.21.200.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.34.21.200.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.70.130.149 attackspam
$f2bV_matches
2020-08-09 15:55:59
87.246.7.26 attackbots
SMTP Bruteforce attempt
2020-08-09 15:48:11
106.52.196.163 attackbots
Brute-force attempt banned
2020-08-09 15:47:58
161.35.37.149 attackbotsspam
srv02 Mass scanning activity detected Target: 26985  ..
2020-08-09 15:59:43
148.235.57.183 attackbotsspam
Tried sshing with brute force.
2020-08-09 16:01:41
123.207.107.144 attackbotsspam
Failed password for root from 123.207.107.144 port 39128 ssh2
2020-08-09 16:21:15
103.87.46.98 attackbotsspam
Autoban   103.87.46.98 AUTH/CONNECT
2020-08-09 15:57:57
51.83.44.111 attackspam
Aug  9 09:05:53 inter-technics sshd[11788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.44.111  user=root
Aug  9 09:05:54 inter-technics sshd[11788]: Failed password for root from 51.83.44.111 port 39318 ssh2
Aug  9 09:09:36 inter-technics sshd[12287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.44.111  user=root
Aug  9 09:09:38 inter-technics sshd[12287]: Failed password for root from 51.83.44.111 port 48570 ssh2
Aug  9 09:13:19 inter-technics sshd[12537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.44.111  user=root
Aug  9 09:13:21 inter-technics sshd[12537]: Failed password for root from 51.83.44.111 port 57816 ssh2
...
2020-08-09 16:20:26
222.186.42.57 attack
Aug  9 08:20:58 rush sshd[3322]: Failed password for root from 222.186.42.57 port 64323 ssh2
Aug  9 08:21:00 rush sshd[3322]: Failed password for root from 222.186.42.57 port 64323 ssh2
Aug  9 08:21:02 rush sshd[3322]: Failed password for root from 222.186.42.57 port 64323 ssh2
...
2020-08-09 16:23:59
45.129.33.155 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 33857 proto: tcp cat: Misc Attackbytes: 60
2020-08-09 16:08:07
218.92.0.216 attackbotsspam
Aug  9 07:50:48 ip-172-31-61-156 sshd[9871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.216  user=root
Aug  9 07:50:50 ip-172-31-61-156 sshd[9871]: Failed password for root from 218.92.0.216 port 13332 ssh2
...
2020-08-09 15:56:19
171.240.66.92 attackbots
Port probing on unauthorized port 445
2020-08-09 15:53:08
49.232.144.7 attackspam
$f2bV_matches
2020-08-09 16:00:44
14.161.3.166 attackspambots
1596945079 - 08/09/2020 05:51:19 Host: 14.161.3.166/14.161.3.166 Port: 445 TCP Blocked
...
2020-08-09 16:05:15
45.230.200.119 attackbotsspam
(mod_security) mod_security (id:920350) triggered by 45.230.200.119 (BR/-/45-230-200-119.inovanettelecom.net.br): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/09 05:51:36 [error] 3682#0: *25973 [client 45.230.200.119] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "159694509633.968957"] [ref "o0,15v21,15"], client: 45.230.200.119, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-08-09 15:49:45

Recently Reported IPs

225.134.201.116 119.220.154.132 46.183.20.101 124.124.148.163
122.227.53.225 195.177.193.148 5.205.97.237 39.189.166.9
96.241.22.209 214.219.249.183 73.86.157.60 225.143.130.197
247.243.221.28 197.252.109.228 250.15.19.157 147.103.83.211
107.131.228.54 130.9.105.139 202.135.134.233 36.43.224.106