Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.164.220.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21575
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.164.220.144.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 14:04:22 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 144.220.164.244.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.220.164.244.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.93.235.74 attackbotsspam
$f2bV_matches
2020-01-21 23:34:40
89.144.47.32 attack
frenzy
2020-01-21 23:46:47
156.198.32.118 attack
Invalid user admin from 156.198.32.118 port 58829
2020-01-21 23:14:27
157.245.204.139 attack
Jan 21 14:39:53 ns4 sshd[7762]: Invalid user dy from 157.245.204.139
Jan 21 14:39:53 ns4 sshd[7762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.204.139 
Jan 21 14:39:55 ns4 sshd[7762]: Failed password for invalid user dy from 157.245.204.139 port 56190 ssh2
Jan 21 14:44:55 ns4 sshd[8987]: Invalid user marco from 157.245.204.139
Jan 21 14:44:55 ns4 sshd[8987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.204.139 
Jan 21 14:44:57 ns4 sshd[8987]: Failed password for invalid user marco from 157.245.204.139 port 38930 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=157.245.204.139
2020-01-21 23:14:03
58.246.51.190 attack
Unauthorized connection attempt detected from IP address 58.246.51.190 to port 22 [T]
2020-01-21 23:52:25
95.48.78.58 attackbotsspam
Unauthorized connection attempt detected from IP address 95.48.78.58 to port 2220 [J]
2020-01-21 23:43:59
106.12.182.142 attackbots
Unauthorized connection attempt detected from IP address 106.12.182.142 to port 2220 [J]
2020-01-21 23:37:22
54.39.147.2 attackbotsspam
Invalid user kelvin from 54.39.147.2 port 51502
2020-01-21 23:53:19
94.191.56.144 attack
Invalid user hzh from 94.191.56.144 port 43128
2020-01-21 23:44:41
60.249.188.118 attack
Invalid user bs from 60.249.188.118 port 55920
2020-01-21 23:50:54
94.191.108.37 attackspam
Unauthorized connection attempt detected from IP address 94.191.108.37 to port 2220 [J]
2020-01-21 23:44:23
104.248.65.180 attackspam
Invalid user ww from 104.248.65.180 port 35966
2020-01-21 23:37:49
154.204.27.158 attackbots
Invalid user foo from 154.204.27.158 port 57922
2020-01-21 23:14:57
103.30.151.4 attack
Invalid user vdi from 103.30.151.4 port 33650
2020-01-21 23:41:51
134.209.171.203 attackbots
Unauthorized connection attempt detected from IP address 134.209.171.203 to port 2220 [J]
2020-01-21 23:19:20

Recently Reported IPs

222.207.156.159 35.163.207.156 206.64.125.69 90.216.94.28
244.143.135.33 37.132.47.160 44.249.23.62 161.2.11.220
23.173.98.88 208.247.170.200 160.182.189.37 52.208.138.209
60.222.237.162 88.105.208.114 89.105.10.209 42.215.207.149
214.213.33.28 247.13.141.61 40.165.152.2 155.216.62.184