Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.148.55.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2348
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.148.55.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 15:02:04 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 58.55.148.44.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 58.55.148.44.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.40.163.108 attackspambots
5500/tcp
[2020-07-08]1pkt
2020-07-09 01:45:22
218.92.0.133 attack
2020-07-08T18:07:22.660358shield sshd\[29832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2020-07-08T18:07:24.566082shield sshd\[29832\]: Failed password for root from 218.92.0.133 port 45381 ssh2
2020-07-08T18:07:28.479864shield sshd\[29832\]: Failed password for root from 218.92.0.133 port 45381 ssh2
2020-07-08T18:07:31.605639shield sshd\[29832\]: Failed password for root from 218.92.0.133 port 45381 ssh2
2020-07-08T18:07:34.471878shield sshd\[29832\]: Failed password for root from 218.92.0.133 port 45381 ssh2
2020-07-09 02:10:10
107.6.183.165 attackbots
 TCP (SYN) 107.6.183.165:26998 -> port 5683, len 44
2020-07-09 01:46:03
112.168.53.22 attackspambots
...
2020-07-09 01:41:31
14.98.168.6 attackspam
Unauthorized connection attempt from IP address 14.98.168.6 on Port 445(SMB)
2020-07-09 02:08:42
49.146.36.189 attackspambots
Automatic report - XMLRPC Attack
2020-07-09 02:07:03
222.186.30.112 attackspambots
detected by Fail2Ban
2020-07-09 01:42:36
45.113.71.49 attack
 UDP 45.113.71.49:40978 -> port 32777, len 68
2020-07-09 02:07:26
59.92.134.129 attackspambots
Unauthorized connection attempt from IP address 59.92.134.129 on Port 445(SMB)
2020-07-09 02:11:04
113.65.176.11 attackbots
23/tcp
[2020-07-08]1pkt
2020-07-09 01:53:16
200.118.57.190 attackspambots
(sshd) Failed SSH login from 200.118.57.190 (CO/Colombia/dynamic-ip-cr20011857190.cable.net.co): 5 in the last 3600 secs
2020-07-09 01:59:43
188.27.238.6 attack
Unauthorized connection attempt from IP address 188.27.238.6 on Port 445(SMB)
2020-07-09 01:54:03
62.138.2.243 attackspam
20 attempts against mh-misbehave-ban on beach
2020-07-09 02:06:24
109.64.66.118 attack
[Mon Jun 01 20:22:10 2020] - DDoS Attack From IP: 109.64.66.118 Port: 51219
2020-07-09 01:55:38
106.12.73.153 attack
IP blocked
2020-07-09 01:37:39

Recently Reported IPs

208.1.56.29 160.176.7.208 220.249.20.163 250.255.116.119
133.7.3.103 133.230.100.38 139.61.159.27 86.63.241.29
127.137.80.130 205.176.74.177 96.228.48.71 99.32.156.200
8.199.18.77 71.1.255.23 225.211.138.0 77.171.95.240
96.213.224.240 211.54.210.208 123.225.7.194 254.175.68.142