Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Egypt

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.44.159.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.44.159.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 12:08:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
104.159.44.41.in-addr.arpa domain name pointer host-41.44.159.104.tedata.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.159.44.41.in-addr.arpa	name = host-41.44.159.104.tedata.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.203.15.172 attack
*Port Scan* detected from 159.203.15.172 (CA/Canada/-). 4 hits in the last 165 seconds
2019-10-23 14:40:29
13.76.155.243 attack
fail2ban honeypot
2019-10-23 14:43:39
103.93.54.137 attack
3x Failed Password
2019-10-23 14:24:05
5.160.172.146 attackspam
2019-10-23T05:51:55.746905  sshd[5570]: Invalid user gpadmin from 5.160.172.146 port 63976
2019-10-23T05:51:55.762657  sshd[5570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.172.146
2019-10-23T05:51:55.746905  sshd[5570]: Invalid user gpadmin from 5.160.172.146 port 63976
2019-10-23T05:51:57.963448  sshd[5570]: Failed password for invalid user gpadmin from 5.160.172.146 port 63976 ssh2
2019-10-23T05:55:35.101305  sshd[5611]: Invalid user gertruda from 5.160.172.146 port 22762
...
2019-10-23 14:18:33
5.54.109.220 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/5.54.109.220/ 
 
 GR - 1H : (52)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GR 
 NAME ASN : ASN3329 
 
 IP : 5.54.109.220 
 
 CIDR : 5.54.96.0/19 
 
 PREFIX COUNT : 167 
 
 UNIQUE IP COUNT : 788480 
 
 
 ATTACKS DETECTED ASN3329 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 6 
 24H - 20 
 
 DateTime : 2019-10-23 05:55:52 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-23 14:05:35
106.14.10.205 attackbotsspam
port scan and connect, tcp 5432 (postgresql)
2019-10-23 14:20:46
84.1.150.12 attackspam
Oct 22 20:10:52 hanapaa sshd\[23537\]: Invalid user testmail1 from 84.1.150.12
Oct 22 20:10:52 hanapaa sshd\[23537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.1.150.12
Oct 22 20:10:53 hanapaa sshd\[23537\]: Failed password for invalid user testmail1 from 84.1.150.12 port 50400 ssh2
Oct 22 20:18:42 hanapaa sshd\[24178\]: Invalid user alice from 84.1.150.12
Oct 22 20:18:42 hanapaa sshd\[24178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.1.150.12
2019-10-23 14:27:21
118.25.103.132 attackbots
Oct 23 00:55:25 ws19vmsma01 sshd[31476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.103.132
Oct 23 00:55:27 ws19vmsma01 sshd[31476]: Failed password for invalid user user from 118.25.103.132 port 57040 ssh2
...
2019-10-23 14:22:30
23.129.64.157 attack
Oct 23 08:09:03 vpn01 sshd[24904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.157
Oct 23 08:09:05 vpn01 sshd[24904]: Failed password for invalid user linode from 23.129.64.157 port 49992 ssh2
...
2019-10-23 14:15:20
92.119.160.90 attack
Oct 23 08:04:25 mc1 kernel: \[3097013.092359\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.90 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=45276 PROTO=TCP SPT=50663 DPT=949 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 23 08:10:01 mc1 kernel: \[3097348.898777\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.90 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=46283 PROTO=TCP SPT=50663 DPT=966 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 23 08:10:49 mc1 kernel: \[3097397.524200\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.90 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=11916 PROTO=TCP SPT=50659 DPT=9265 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-23 14:21:12
117.50.67.214 attack
Oct 23 06:02:31 venus sshd\[30466\]: Invalid user seidel from 117.50.67.214 port 41522
Oct 23 06:02:31 venus sshd\[30466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.67.214
Oct 23 06:02:33 venus sshd\[30466\]: Failed password for invalid user seidel from 117.50.67.214 port 41522 ssh2
...
2019-10-23 14:26:39
177.136.215.240 attackspam
400 BAD REQUEST
2019-10-23 14:30:08
116.196.90.181 attackspambots
Automatic report - Banned IP Access
2019-10-23 14:04:41
89.45.17.11 attackbotsspam
Oct 23 07:45:48 v22018076622670303 sshd\[26309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.17.11  user=root
Oct 23 07:45:49 v22018076622670303 sshd\[26309\]: Failed password for root from 89.45.17.11 port 52167 ssh2
Oct 23 07:49:56 v22018076622670303 sshd\[26316\]: Invalid user rafael from 89.45.17.11 port 43300
...
2019-10-23 14:39:19
81.22.45.190 attack
10/23/2019-07:23:45.337844 81.22.45.190 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-23 14:09:50

Recently Reported IPs

207.136.93.216 50.169.22.238 46.97.46.19 36.240.111.149
35.230.203.77 43.40.134.230 85.112.41.8 106.216.88.110
211.19.226.39 255.156.48.5 88.35.163.80 165.66.210.131
232.46.155.97 181.198.125.204 57.167.156.167 239.84.232.156
149.196.233.133 5.43.247.124 126.105.193.180 79.231.247.220