Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.44.214.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39878
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.44.214.129.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 02:32:24 CST 2025
;; MSG SIZE  rcvd: 107
Host info
129.214.44.208.in-addr.arpa domain name pointer 208-44-214-129.dynamic.bardstowncable.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.214.44.208.in-addr.arpa	name = 208-44-214-129.dynamic.bardstowncable.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.204.191.53 attackbots
Nov  6 16:57:01 lnxded63 sshd[28419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.204.191.53
2019-11-07 04:36:49
61.49.134.138 attackbots
11/06/2019-09:33:39.463026 61.49.134.138 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-07 04:36:28
148.70.59.114 attack
Nov  6 16:31:30 vps666546 sshd\[23259\]: Invalid user subscriber from 148.70.59.114 port 31515
Nov  6 16:31:30 vps666546 sshd\[23259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.59.114
Nov  6 16:31:32 vps666546 sshd\[23259\]: Failed password for invalid user subscriber from 148.70.59.114 port 31515 ssh2
Nov  6 16:37:15 vps666546 sshd\[23366\]: Invalid user iX2fF9N3\*Sun\*75A from 148.70.59.114 port 12974
Nov  6 16:37:15 vps666546 sshd\[23366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.59.114
...
2019-11-07 04:45:59
95.213.177.122 attackspam
Nov  6 18:34:20   TCP Attack: SRC=95.213.177.122 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=241  PROTO=TCP SPT=45257 DPT=8000 WINDOW=1024 RES=0x00 SYN URGP=0
2019-11-07 04:32:31
118.222.249.158 attackspambots
DATE:2019-11-06 15:56:52, IP:118.222.249.158, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2019-11-07 04:31:17
81.22.45.100 attack
" "
2019-11-07 04:28:04
49.234.4.16 attackspambots
Nov  6 18:55:55 legacy sshd[6823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.4.16
Nov  6 18:55:57 legacy sshd[6823]: Failed password for invalid user 123456 from 49.234.4.16 port 33038 ssh2
Nov  6 18:59:55 legacy sshd[6954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.4.16
...
2019-11-07 04:18:03
184.105.247.250 attackbotsspam
" "
2019-11-07 04:53:17
85.110.196.119 attackspambots
Automatic report - Port Scan Attack
2019-11-07 04:43:09
52.125.128.3 attack
Brute Force Attack
2019-11-07 04:19:57
45.136.108.66 attackbotsspam
Connection by 45.136.108.66 on port: 7895 got caught by honeypot at 11/6/2019 2:06:13 PM
2019-11-07 04:41:23
81.22.45.117 attackspam
11/06/2019-21:05:45.497734 81.22.45.117 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-07 04:22:17
45.82.153.35 attack
firewall-block, port(s): 55511/tcp
2019-11-07 04:34:01
128.199.162.2 attack
Nov  6 15:44:11 venus sshd\[5268\]: Invalid user macarena from 128.199.162.2 port 56472
Nov  6 15:44:11 venus sshd\[5268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2
Nov  6 15:44:13 venus sshd\[5268\]: Failed password for invalid user macarena from 128.199.162.2 port 56472 ssh2
...
2019-11-07 04:27:43
61.246.7.145 attackbots
Nov  6 17:32:34 marvibiene sshd[52621]: Invalid user votmdnjem from 61.246.7.145 port 53366
Nov  6 17:32:34 marvibiene sshd[52621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.246.7.145
Nov  6 17:32:34 marvibiene sshd[52621]: Invalid user votmdnjem from 61.246.7.145 port 53366
Nov  6 17:32:36 marvibiene sshd[52621]: Failed password for invalid user votmdnjem from 61.246.7.145 port 53366 ssh2
...
2019-11-07 04:56:57

Recently Reported IPs

67.58.69.232 92.234.235.46 248.63.247.96 121.199.91.209
36.155.85.243 131.102.153.28 177.135.232.152 78.109.70.2
83.194.93.162 204.134.44.111 136.113.254.15 138.80.224.185
242.224.107.247 124.128.103.174 250.183.109.97 61.213.155.21
44.203.162.125 131.213.178.241 69.75.23.3 127.4.16.111