Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.220.22.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41964
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.220.22.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 23:56:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
214.22.220.44.in-addr.arpa domain name pointer ec2-44-220-22-214.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.22.220.44.in-addr.arpa	name = ec2-44-220-22-214.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
221.144.61.3 attack
Feb 24 13:27:26 stark sshd[17029]: Invalid user typhon from 221.144.61.3
Feb 24 13:31:19 stark sshd[17056]: Invalid user ftpuser from 221.144.61.3
Feb 24 13:35:11 stark sshd[17106]: Invalid user typhon from 221.144.61.3
Feb 24 13:38:57 stark sshd[17160]: Invalid user ubuntu from 221.144.61.3
2020-02-25 04:02:09
180.76.110.70 attackspam
SSH Brute-Force reported by Fail2Ban
2020-02-25 04:32:51
222.186.173.180 attack
Feb 24 17:14:07 firewall sshd[24934]: Failed password for root from 222.186.173.180 port 40520 ssh2
Feb 24 17:14:16 firewall sshd[24934]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 40520 ssh2 [preauth]
Feb 24 17:14:16 firewall sshd[24934]: Disconnecting: Too many authentication failures [preauth]
...
2020-02-25 04:16:51
23.249.168.57 attackbotsspam
02/24/2020-14:21:45.186237 23.249.168.57 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-25 04:32:25
60.243.128.164 attackbots
Email rejected due to spam filtering
2020-02-25 04:18:56
118.99.124.26 attackspam
Email rejected due to spam filtering
2020-02-25 04:16:02
220.142.164.49 attackbotsspam
1582550507 - 02/24/2020 14:21:47 Host: 220.142.164.49/220.142.164.49 Port: 445 TCP Blocked
2020-02-25 04:29:19
181.115.221.254 attackbotsspam
T: f2b postfix aggressive 3x
2020-02-25 04:31:27
42.189.21.115 attackbots
DATE:2020-02-24 14:20:15, IP:42.189.21.115, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-25 04:13:01
14.251.20.6 attack
1582550567 - 02/24/2020 14:22:47 Host: 14.251.20.6/14.251.20.6 Port: 445 TCP Blocked
2020-02-25 04:04:42
37.151.103.169 attack
Email rejected due to spam filtering
2020-02-25 03:59:28
107.158.93.205 attackspambots
(From roderick.thanh@yahoo.com) Hi,
Permit us to quickly remind you about the available premium-quality  Brace Support Belt Posture Corrector for men and women available at Shoulderposture.com .  
The Posture Corrector are made to give maximum comfort and adjustable. The belt is very easy to use and soft to allow the flow of breath.  Posture Corrector can be undetectable underclothes: No need to feel self-conscious about wearing a posture brace. The latex-free adjustable design is discreet enough to wear under your shirt or blouse.
Please note that the product is currently sold at a huge discounted price. It may return to the regular price any time soon. Visit our store to get yours now. Free and fast shipping service available! 
Visit Our Store Now:  Shoulderposture.com 
 
Thank you,
Shoulderposture.com Team
2020-02-25 04:34:07
78.183.110.161 attackspambots
Automatic report - Port Scan Attack
2020-02-25 03:54:32
212.156.51.34 attackspambots
Unauthorized connection attempt detected from IP address 212.156.51.34 to port 445
2020-02-25 03:59:04
95.29.116.1 attackbotsspam
Port probing on unauthorized port 445
2020-02-25 04:32:01

Recently Reported IPs

208.59.38.219 92.27.113.219 225.5.76.37 72.110.118.190
154.98.205.190 135.24.174.236 152.168.157.50 18.72.48.239
12.115.157.28 42.190.106.24 174.100.93.103 53.133.202.218
251.20.23.213 54.235.137.75 201.190.144.170 37.188.196.42
192.37.210.226 72.82.149.154 91.12.81.183 70.22.238.145