Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.45.241.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.45.241.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 23:46:20 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 82.241.45.244.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.241.45.244.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.6.183.230 attackbotsspam
firewall-block, port(s): 8888/tcp
2019-11-05 03:49:21
52.57.124.27 attack
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-11-05 03:56:29
36.81.87.227 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-05 04:17:00
39.45.13.154 attackbotsspam
/wp-login.php
2019-11-05 03:48:13
103.42.56.167 attackbots
xmlrpc attack
2019-11-05 04:19:44
202.168.66.190 attackbotsspam
Triggered: repeated knocking on closed ports.
2019-11-05 03:55:38
40.73.29.153 attack
Nov  4 17:36:18 MK-Soft-Root2 sshd[31138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.29.153 
Nov  4 17:36:19 MK-Soft-Root2 sshd[31138]: Failed password for invalid user hadoop from 40.73.29.153 port 54614 ssh2
...
2019-11-05 04:24:19
165.227.122.251 attackbots
2019-11-04T16:03:58.128059abusebot-5.cloudsearch.cf sshd\[16479\]: Invalid user andre from 165.227.122.251 port 58734
2019-11-05 04:11:51
153.92.127.204 attack
Nov  4 19:18:57 server sshd\[25742\]: Invalid user konowicz from 153.92.127.204 port 53094
Nov  4 19:18:57 server sshd\[25742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.92.127.204
Nov  4 19:18:59 server sshd\[25742\]: Failed password for invalid user konowicz from 153.92.127.204 port 53094 ssh2
Nov  4 19:22:37 server sshd\[29882\]: Invalid user zhejiang@\#$longteng789520 from 153.92.127.204 port 37144
Nov  4 19:22:37 server sshd\[29882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.92.127.204
2019-11-05 04:06:24
89.248.160.178 attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-11-05 04:03:21
187.32.140.225 attack
Honeypot attack, port: 445, PTR: 187-032-140-225.static.ctbctelecom.com.br.
2019-11-05 04:25:49
51.15.84.19 attackspam
SSH bruteforce
2019-11-05 04:05:18
183.103.35.198 attack
2019-11-04T18:56:25.932396abusebot-5.cloudsearch.cf sshd\[17677\]: Invalid user robert from 183.103.35.198 port 35752
2019-11-05 03:58:48
117.186.72.202 attackbots
Nov  4 15:17:15 game-panel sshd[32477]: Failed password for root from 117.186.72.202 port 34588 ssh2
Nov  4 15:24:03 game-panel sshd[32642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.186.72.202
Nov  4 15:24:06 game-panel sshd[32642]: Failed password for invalid user gozone from 117.186.72.202 port 41276 ssh2
2019-11-05 04:04:08
187.162.22.114 attackbots
Automatic report - Port Scan Attack
2019-11-05 04:26:34

Recently Reported IPs

179.86.250.243 225.45.130.144 67.166.186.137 91.175.125.186
49.207.60.40 37.156.1.26 77.213.70.37 41.151.7.224
255.101.18.67 6.50.237.146 62.229.153.98 241.142.154.108
30.74.209.214 108.182.12.105 172.235.236.244 142.182.61.56
238.49.226.13 38.95.183.145 65.50.152.255 132.149.127.4