Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.189.114.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59684
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.189.114.64.			IN	A

;; AUTHORITY SECTION:
.			168	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012100 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 22 00:31:19 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 64.114.189.44.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.114.189.44.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
184.105.247.198 attack
Port scan: Attack repeated for 24 hours
2020-09-21 02:22:07
145.239.82.87 attackbotsspam
145.239.82.87 (PL/Poland/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 20 12:10:43 server sshd[27960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.46.166  user=root
Sep 20 12:10:45 server sshd[27960]: Failed password for root from 104.131.46.166 port 53612 ssh2
Sep 20 12:24:48 server sshd[29436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.146  user=root
Sep 20 12:13:41 server sshd[28381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.7.189  user=root
Sep 20 12:13:43 server sshd[28381]: Failed password for root from 172.245.7.189 port 38432 ssh2
Sep 20 12:11:54 server sshd[28154]: Failed password for root from 145.239.82.87 port 35381 ssh2

IP Addresses Blocked:

104.131.46.166 (US/United States/-)
185.220.101.146 (DE/Germany/-)
172.245.7.189 (US/United States/-)
2020-09-21 02:45:34
184.105.247.222 attackspambots
 TCP (SYN) 184.105.247.222:60972 -> port 30005, len 44
2020-09-21 02:51:39
185.220.101.200 attack
GET /wp-config.php.1
2020-09-21 02:21:41
192.144.232.129 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-21 02:20:23
205.185.117.149 attackspam
Sep 20 12:16:55 ws26vmsma01 sshd[220628]: Failed password for root from 205.185.117.149 port 56964 ssh2
Sep 20 12:17:02 ws26vmsma01 sshd[220628]: Failed password for root from 205.185.117.149 port 56964 ssh2
...
2020-09-21 02:26:20
27.7.160.224 attackbots
Listed on    dnsbl-sorbs plus abuseat.org and barracudaCentral   / proto=6  .  srcport=15915  .  dstport=23  .     (2279)
2020-09-21 02:50:08
111.47.18.22 attack
Automatic report - Banned IP Access
2020-09-21 02:53:05
218.92.0.211 attackbots
Sep 21 00:16:12 mx sshd[825030]: Failed password for root from 218.92.0.211 port 33612 ssh2
Sep 21 00:16:15 mx sshd[825030]: Failed password for root from 218.92.0.211 port 33612 ssh2
Sep 21 00:16:19 mx sshd[825030]: Failed password for root from 218.92.0.211 port 33612 ssh2
Sep 21 00:17:37 mx sshd[825049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Sep 21 00:17:39 mx sshd[825049]: Failed password for root from 218.92.0.211 port 29227 ssh2
...
2020-09-21 02:55:23
67.45.32.63 attackspambots
Brute forcing email accounts
2020-09-21 02:48:16
178.33.216.187 attack
178.33.216.187 (FR/France/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 20 11:50:08 server4 sshd[1421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.114.51  user=root
Sep 20 11:50:10 server4 sshd[1421]: Failed password for root from 122.51.114.51 port 60412 ssh2
Sep 20 11:51:31 server4 sshd[2633]: Failed password for root from 178.33.216.187 port 34642 ssh2
Sep 20 11:54:14 server4 sshd[3825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.39.26  user=root
Sep 20 11:53:26 server4 sshd[3672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.13.133  user=root
Sep 20 11:53:27 server4 sshd[3672]: Failed password for root from 174.138.13.133 port 36502 ssh2

IP Addresses Blocked:

122.51.114.51 (CN/China/-)
2020-09-21 02:52:10
150.95.66.29 attackspambots
Port Scan
...
2020-09-21 02:41:08
137.74.132.175 attackspambots
Time:     Sun Sep 20 17:21:27 2020 +0000
IP:       137.74.132.175 (BE/Belgium/ip175.ip-137-74-132.eu)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 20 16:55:49 48-1 sshd[84438]: Failed password for root from 137.74.132.175 port 41598 ssh2
Sep 20 17:10:29 48-1 sshd[85096]: Failed password for root from 137.74.132.175 port 60030 ssh2
Sep 20 17:14:09 48-1 sshd[85240]: Failed password for root from 137.74.132.175 port 42552 ssh2
Sep 20 17:17:42 48-1 sshd[85439]: Failed password for root from 137.74.132.175 port 53302 ssh2
Sep 20 17:21:24 48-1 sshd[85602]: Invalid user debian from 137.74.132.175 port 35836
2020-09-21 02:29:20
216.218.206.96 attack
Port Scan/VNC login attempt
...
2020-09-21 02:25:57
200.56.91.194 attackspambots
Automatic report - Port Scan Attack
2020-09-21 02:34:26

Recently Reported IPs

13.152.23.98 232.250.204.5 138.166.199.65 95.6.66.66
29.38.42.137 196.152.254.190 236.76.19.172 250.1.217.168
225.171.8.61 142.79.230.100 13.217.52.98 1.29.132.13
188.254.250.187 25.142.64.123 13.55.225.151 46.235.164.242
197.113.218.143 22.96.46.157 217.173.182.168 199.28.8.19