Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 227.44.150.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;227.44.150.104.			IN	A

;; AUTHORITY SECTION:
.			460	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 167 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 00:54:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 104.150.44.227.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.150.44.227.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.29.196.172 attackspambots
TCP src-port=36599   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (399)
2019-07-04 17:50:16
162.243.148.116 attackspam
8888/tcp 6667/tcp 54083/tcp...
[2019-05-04/07-04]52pkt,46pt.(tcp),1pt.(udp),1proto
2019-07-04 17:50:38
176.58.127.68 attackbotsspam
2087/tcp 18245/tcp 7800/tcp...
[2019-05-23/07-03]92pkt,79pt.(tcp),1pt.(udp)
2019-07-04 17:54:48
198.20.103.242 attackbots
[connect count:8 time(s)][SMTP/25/465/587 Probe]
[SMTPD] RECEIVED: EHLO sh-ams-nl-gp1-wk101.internet-census.org
[SMTPD] SENT: 554 5.7.1 Rejected: banned by AbuseIpDb

in blocklist.de:"listed [mail]"
*(07041045)
2019-07-04 17:29:38
182.74.25.246 attackbots
04.07.2019 07:56:38 SSH access blocked by firewall
2019-07-04 17:30:05
111.44.219.90 attack
Brute force RDP, port 3389
2019-07-04 17:05:26
45.236.244.130 attackbots
Jul  4 02:12:54 debian sshd\[31704\]: Invalid user nicholas from 45.236.244.130 port 39954
Jul  4 02:12:54 debian sshd\[31704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.236.244.130
Jul  4 02:12:56 debian sshd\[31704\]: Failed password for invalid user nicholas from 45.236.244.130 port 39954 ssh2
...
2019-07-04 17:06:29
89.248.168.176 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-04 17:19:11
118.128.50.136 attackspam
Jul  4 09:02:36 vpn01 sshd\[14754\]: Invalid user jude from 118.128.50.136
Jul  4 09:02:36 vpn01 sshd\[14754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.128.50.136
Jul  4 09:02:39 vpn01 sshd\[14754\]: Failed password for invalid user jude from 118.128.50.136 port 39437 ssh2
2019-07-04 17:28:58
218.22.100.42 attackbotsspam
Brute force attempt
2019-07-04 17:13:49
94.70.251.51 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 09:08:11,823 INFO [shellcode_manager] (94.70.251.51) no match, writing hexdump (d09e45181a6bb2f71a08468966a6e2d4 :2167681) - MS17010 (EternalBlue)
2019-07-04 17:21:28
218.92.0.200 attackbots
Jul  4 08:16:42 ip-172-31-1-72 sshd\[26587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200  user=root
Jul  4 08:16:44 ip-172-31-1-72 sshd\[26587\]: Failed password for root from 218.92.0.200 port 21456 ssh2
Jul  4 08:17:59 ip-172-31-1-72 sshd\[26605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200  user=root
Jul  4 08:18:00 ip-172-31-1-72 sshd\[26605\]: Failed password for root from 218.92.0.200 port 32915 ssh2
Jul  4 08:19:22 ip-172-31-1-72 sshd\[26609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200  user=root
2019-07-04 17:22:39
31.220.0.225 attackspam
Jul  4 09:42:57 km20725 sshd\[24538\]: Failed password for root from 31.220.0.225 port 40592 ssh2Jul  4 09:43:00 km20725 sshd\[24538\]: Failed password for root from 31.220.0.225 port 40592 ssh2Jul  4 09:43:02 km20725 sshd\[24538\]: Failed password for root from 31.220.0.225 port 40592 ssh2Jul  4 09:43:04 km20725 sshd\[24538\]: Failed password for root from 31.220.0.225 port 40592 ssh2
...
2019-07-04 17:10:49
77.247.108.144 attackspambots
firewall-block, port(s): 50100/udp, 50800/udp
2019-07-04 17:04:13
185.150.129.60 attackspambots
TCP src-port=58960   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (400)
2019-07-04 17:47:58

Recently Reported IPs

137.205.116.36 73.7.190.182 152.84.64.200 148.217.92.102
127.131.24.9 118.134.215.57 0.173.157.93 190.170.16.89
42.145.58.165 73.38.208.71 198.107.244.192 117.25.108.51
137.41.197.24 140.53.169.130 107.245.46.82 114.51.130.234
83.37.148.211 116.185.74.136 17.243.225.255 111.137.190.194