Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.149.107.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.149.107.5.			IN	A

;; AUTHORITY SECTION:
.			279	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 07:31:00 CST 2023
;; MSG SIZE  rcvd: 105
Host info
5.107.149.44.in-addr.arpa domain name pointer dhcp-44-149-107-5.db0hsn.as64646.de.ampr.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.107.149.44.in-addr.arpa	name = dhcp-44-149-107-5.db0hsn.as64646.de.ampr.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.92.80.120 attack
Jun 24 14:07:50 electroncash sshd[39309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.80.120 
Jun 24 14:07:50 electroncash sshd[39309]: Invalid user sonos from 120.92.80.120 port 10315
Jun 24 14:07:52 electroncash sshd[39309]: Failed password for invalid user sonos from 120.92.80.120 port 10315 ssh2
Jun 24 14:09:54 electroncash sshd[39846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.80.120  user=root
Jun 24 14:09:55 electroncash sshd[39846]: Failed password for root from 120.92.80.120 port 20022 ssh2
...
2020-06-24 20:23:08
89.34.27.48 attack
Automatic report - Banned IP Access
2020-06-24 20:14:06
13.68.171.41 attack
Jun 24 10:36:23 inter-technics sshd[7596]: Invalid user weblogic from 13.68.171.41 port 58648
Jun 24 10:36:23 inter-technics sshd[7596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.171.41
Jun 24 10:36:23 inter-technics sshd[7596]: Invalid user weblogic from 13.68.171.41 port 58648
Jun 24 10:36:25 inter-technics sshd[7596]: Failed password for invalid user weblogic from 13.68.171.41 port 58648 ssh2
Jun 24 10:37:42 inter-technics sshd[7715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.171.41  user=root
Jun 24 10:37:44 inter-technics sshd[7715]: Failed password for root from 13.68.171.41 port 41146 ssh2
...
2020-06-24 19:49:42
203.128.249.42 attackbotsspam
 TCP (SYN) 203.128.249.42:55562 -> port 445, len 52
2020-06-24 19:46:17
34.80.135.20 attackbots
firewall-block, port(s): 17412/tcp
2020-06-24 20:13:05
212.29.210.123 attack
Invalid user cc from 212.29.210.123 port 55088
2020-06-24 20:09:38
111.229.169.170 attackspambots
Oracle WebLogic wls9-async Remote Code Execution Vulnerability, PTR: PTR record not found
2020-06-24 20:13:32
68.183.131.247 attackspam
Invalid user chester from 68.183.131.247 port 51812
2020-06-24 19:57:14
1.53.207.225 attackbotsspam
firewall-block, port(s): 445/tcp
2020-06-24 20:18:14
49.88.112.73 attackbots
Logfile match
2020-06-24 20:01:04
139.219.1.209 attackbots
Jun 23 15:23:03 zulu1842 sshd[16577]: Invalid user leo from 139.219.1.209
Jun 23 15:23:03 zulu1842 sshd[16577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.1.209 
Jun 23 15:23:05 zulu1842 sshd[16577]: Failed password for invalid user leo from 139.219.1.209 port 44636 ssh2
Jun 23 15:23:05 zulu1842 sshd[16577]: Received disconnect from 139.219.1.209: 11: Bye Bye [preauth]
Jun 23 15:34:34 zulu1842 sshd[20583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.1.209  user=r.r
Jun 23 15:34:36 zulu1842 sshd[20583]: Failed password for r.r from 139.219.1.209 port 48546 ssh2
Jun 23 15:34:36 zulu1842 sshd[20583]: Received disconnect from 139.219.1.209: 11: Bye Bye [preauth]
Jun 23 15:37:40 zulu1842 sshd[21731]: Invalid user renato from 139.219.1.209
Jun 23 15:37:40 zulu1842 sshd[21731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.1........
-------------------------------
2020-06-24 20:12:36
168.195.187.17 attackspambots
Jun 24 13:56:08 xeon postfix/smtpd[53056]: warning: unknown[168.195.187.17]: SASL PLAIN authentication failed: authentication failure
2020-06-24 20:16:48
148.72.158.240 attack
SIPVicious Scanner Detection , PTR: condor3945.startdedicated.com.
2020-06-24 20:26:28
83.97.20.35 attackspam
 TCP (SYN) 83.97.20.35:45425 -> port 10001, len 44
2020-06-24 19:45:27
156.96.156.158 attackbotsspam
SIPVicious Scanner Detection , PTR: PTR record not found
2020-06-24 20:22:50

Recently Reported IPs

69.235.25.130 146.221.12.53 150.63.84.30 175.250.128.99
245.171.170.248 162.158.75.234 104.147.93.234 40.148.209.23
111.243.216.132 242.215.216.171 168.114.58.229 175.208.52.30
72.242.171.1 32.240.12.56 132.209.146.168 56.70.192.215
242.208.203.237 159.204.70.216 226.0.36.96 157.144.87.166