Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.218.80.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.218.80.149.			IN	A

;; AUTHORITY SECTION:
.			448	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020101 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 02 11:49:51 CST 2022
;; MSG SIZE  rcvd: 106
Host info
149.80.218.44.in-addr.arpa domain name pointer ec2-44-218-80-149.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.80.218.44.in-addr.arpa	name = ec2-44-218-80-149.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.71.29.162 attackspam
Port Scan
...
2020-07-25 04:17:33
45.160.138.165 attackspambots
Jul 24 08:44:30 mail.srvfarm.net postfix/smtps/smtpd[2137441]: warning: unknown[45.160.138.165]: SASL PLAIN authentication failed: 
Jul 24 08:44:30 mail.srvfarm.net postfix/smtps/smtpd[2137441]: lost connection after AUTH from unknown[45.160.138.165]
Jul 24 08:46:01 mail.srvfarm.net postfix/smtps/smtpd[2137533]: warning: unknown[45.160.138.165]: SASL PLAIN authentication failed: 
Jul 24 08:46:02 mail.srvfarm.net postfix/smtps/smtpd[2137533]: lost connection after AUTH from unknown[45.160.138.165]
Jul 24 08:54:12 mail.srvfarm.net postfix/smtpd[2140704]: warning: unknown[45.160.138.165]: SASL PLAIN authentication failed:
2020-07-25 04:29:06
88.246.17.23 attackbots
Honeypot attack, port: 445, PTR: 88.246.17.23.static.ttnet.com.tr.
2020-07-25 04:04:56
206.189.178.171 attackspam
Jul 24 16:11:54 vmd36147 sshd[21279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.178.171
Jul 24 16:11:55 vmd36147 sshd[21279]: Failed password for invalid user debian from 206.189.178.171 port 54304 ssh2
Jul 24 16:15:44 vmd36147 sshd[29602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.178.171
...
2020-07-25 03:59:25
106.12.16.2 attack
Jul 24 23:04:02 pkdns2 sshd\[2043\]: Invalid user fw from 106.12.16.2Jul 24 23:04:04 pkdns2 sshd\[2043\]: Failed password for invalid user fw from 106.12.16.2 port 37398 ssh2Jul 24 23:06:27 pkdns2 sshd\[2178\]: Invalid user administrator from 106.12.16.2Jul 24 23:06:29 pkdns2 sshd\[2178\]: Failed password for invalid user administrator from 106.12.16.2 port 38798 ssh2Jul 24 23:08:39 pkdns2 sshd\[2246\]: Invalid user mc from 106.12.16.2Jul 24 23:08:42 pkdns2 sshd\[2246\]: Failed password for invalid user mc from 106.12.16.2 port 40148 ssh2
...
2020-07-25 04:15:38
18.212.14.218 attackbotsspam
Wordpress login scanning
2020-07-25 04:05:24
186.84.172.25 attackbotsspam
Bruteforce detected by fail2ban
2020-07-25 04:34:07
35.244.25.124 attack
Jul 24 21:41:11 rancher-0 sshd[558625]: Invalid user px from 35.244.25.124 port 55466
Jul 24 21:41:13 rancher-0 sshd[558625]: Failed password for invalid user px from 35.244.25.124 port 55466 ssh2
...
2020-07-25 04:35:10
106.12.182.38 attackbots
Jul 24 19:16:30 vmd36147 sshd[20754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.182.38
Jul 24 19:16:33 vmd36147 sshd[20754]: Failed password for invalid user poster from 106.12.182.38 port 40750 ssh2
Jul 24 19:20:22 vmd36147 sshd[28921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.182.38
...
2020-07-25 04:21:36
116.206.9.46 attackspam
Honeypot attack, port: 445, PTR: subs25-116-206-9-46.three.co.id.
2020-07-25 04:34:38
129.226.177.59 attack
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.177.59 
Failed password for invalid user altri from 129.226.177.59 port 33836 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.177.59
2020-07-25 04:12:04
124.251.110.164 attackbotsspam
Jul 24 21:36:37 nextcloud sshd\[15587\]: Invalid user elastic from 124.251.110.164
Jul 24 21:36:37 nextcloud sshd\[15587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.164
Jul 24 21:36:39 nextcloud sshd\[15587\]: Failed password for invalid user elastic from 124.251.110.164 port 40600 ssh2
2020-07-25 04:04:18
51.222.29.24 attackspam
Jul 24 17:39:20 master sshd[28580]: Failed password for invalid user ftpuser from 51.222.29.24 port 44600 ssh2
Jul 24 17:53:01 master sshd[28829]: Failed password for svn from 51.222.29.24 port 59140 ssh2
Jul 24 17:58:28 master sshd[28917]: Failed password for invalid user lfc from 51.222.29.24 port 43424 ssh2
Jul 24 18:03:38 master sshd[29402]: Failed password for invalid user aditya from 51.222.29.24 port 55936 ssh2
Jul 24 18:08:50 master sshd[29504]: Failed password for invalid user duc from 51.222.29.24 port 40216 ssh2
Jul 24 18:14:07 master sshd[29661]: Failed password for invalid user nj from 51.222.29.24 port 52730 ssh2
Jul 24 18:19:13 master sshd[29818]: Failed password for invalid user design from 51.222.29.24 port 37010 ssh2
Jul 24 18:24:14 master sshd[29949]: Failed password for invalid user patricia from 51.222.29.24 port 49522 ssh2
Jul 24 18:29:32 master sshd[29999]: Failed password for invalid user admin from 51.222.29.24 port 33804 ssh2
2020-07-25 04:07:17
49.88.112.111 attack
Jul 24 12:48:05 dignus sshd[31565]: Failed password for root from 49.88.112.111 port 16445 ssh2
Jul 24 12:48:07 dignus sshd[31565]: Failed password for root from 49.88.112.111 port 16445 ssh2
Jul 24 12:48:10 dignus sshd[31565]: Failed password for root from 49.88.112.111 port 16445 ssh2
Jul 24 12:48:44 dignus sshd[31617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Jul 24 12:48:46 dignus sshd[31617]: Failed password for root from 49.88.112.111 port 48456 ssh2
...
2020-07-25 04:08:59
49.232.172.244 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-24T13:33:14Z and 2020-07-24T13:44:43Z
2020-07-25 04:07:33

Recently Reported IPs

32.165.184.89 15.181.51.34 241.247.170.181 223.126.183.41
83.214.228.30 197.30.118.139 107.203.18.124 226.73.106.213
221.161.142.224 234.9.98.220 69.240.43.252 109.123.32.29
175.183.201.190 105.95.111.190 118.22.57.64 150.167.125.3
175.87.74.57 72.177.202.115 17.177.158.155 47.204.239.57