Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.221.142.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2000
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;244.221.142.81.			IN	A

;; AUTHORITY SECTION:
.			272	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082500 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Aug 25 23:27:24 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 81.142.221.244.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.142.221.244.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.239.236.22 attack
Unauthorised access (Oct  3) SRC=113.239.236.22 LEN=40 TTL=49 ID=62459 TCP DPT=8080 WINDOW=13493 SYN 
Unauthorised access (Oct  2) SRC=113.239.236.22 LEN=40 TTL=49 ID=19471 TCP DPT=8080 WINDOW=49532 SYN
2019-10-03 08:20:57
35.225.21.76 attackbotsspam
02.10.2019 23:25:15 - Wordpress fail 
Detected by ELinOX-ALM
2019-10-03 08:43:47
89.46.74.105 attackbotsspam
Automatic report - Banned IP Access
2019-10-03 08:34:16
213.154.14.114 attack
Invalid user admin from 213.154.14.114 port 49329
2019-10-03 08:49:50
91.180.125.193 attackspambots
Oct  2 09:48:48 XXX sshd[8179]: Invalid user frank from 91.180.125.193 port 47892
2019-10-03 08:32:00
123.206.51.192 attackbotsspam
Oct  3 01:27:29 lnxded63 sshd[7856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.51.192
2019-10-03 08:29:17
185.81.157.104 attackbots
389/udp 123/udp 11211/udp...
[2019-08-02/10-02]67pkt,4pt.(udp)
2019-10-03 08:27:57
128.199.177.224 attackspambots
$f2bV_matches
2019-10-03 08:24:20
125.64.94.211 attackbotsspam
port scan and connect, tcp 6379 (redis)
2019-10-03 08:43:17
92.63.194.90 attack
Oct  3 01:03:45 core sshd[8172]: Invalid user admin from 92.63.194.90 port 50956
Oct  3 01:03:47 core sshd[8172]: Failed password for invalid user admin from 92.63.194.90 port 50956 ssh2
...
2019-10-03 08:55:50
151.80.99.35 attackspam
Oct  3 00:32:43 web8 sshd\[13032\]: Invalid user centos from 151.80.99.35
Oct  3 00:32:44 web8 sshd\[13032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.99.35
Oct  3 00:32:46 web8 sshd\[13032\]: Failed password for invalid user centos from 151.80.99.35 port 37344 ssh2
Oct  3 00:33:33 web8 sshd\[13405\]: Invalid user cent from 151.80.99.35
Oct  3 00:33:33 web8 sshd\[13405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.99.35
2019-10-03 08:54:47
212.227.200.250 attack
fell into ViewStateTrap:paris
2019-10-03 08:50:15
182.214.170.72 attackbots
Oct  3 03:14:44 www2 sshd\[39189\]: Invalid user hanna from 182.214.170.72Oct  3 03:14:46 www2 sshd\[39189\]: Failed password for invalid user hanna from 182.214.170.72 port 36996 ssh2Oct  3 03:19:24 www2 sshd\[39713\]: Invalid user bot from 182.214.170.72
...
2019-10-03 08:28:17
119.194.91.157 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/119.194.91.157/ 
 KR - 1H : (440)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KR 
 NAME ASN : ASN4766 
 
 IP : 119.194.91.157 
 
 CIDR : 119.194.88.0/22 
 
 PREFIX COUNT : 8136 
 
 UNIQUE IP COUNT : 44725248 
 
 
 WYKRYTE ATAKI Z ASN4766 :  
  1H - 26 
  3H - 67 
  6H - 130 
 12H - 144 
 24H - 206 
 
 DateTime : 2019-10-02 23:25:10 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-03 08:39:58
144.135.85.184 attackbots
Oct  3 01:29:12 icinga sshd[20306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.135.85.184
Oct  3 01:29:14 icinga sshd[20306]: Failed password for invalid user smmsp from 144.135.85.184 port 13075 ssh2
...
2019-10-03 08:22:57

Recently Reported IPs

192.146.231.106 187.245.137.220 177.182.134.145 125.118.103.59
111.229.215.184 202.7.222.72 106.54.220.54 215.176.100.27
124.160.89.213 69.238.84.111 192.141.247.101 106.47.37.120
218.212.159.81 111.144.52.11 103.231.213.39 136.204.127.126
52.62.205.178 56.116.130.29 190.148.157.159 18.11.97.77