Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.241.109.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.241.109.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121703 1800 900 604800 86400

;; Query time: 240 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 18 11:59:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
195.109.241.44.in-addr.arpa domain name pointer ec2-44-241-109-195.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
195.109.241.44.in-addr.arpa	name = ec2-44-241-109-195.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.55.182.232 attackspam
Brute-force attempt banned
2020-10-02 16:01:15
41.38.50.50 attackbots
Found on   CINS badguys     / proto=6  .  srcport=54914  .  dstport=1433  .     (4293)
2020-10-02 15:44:44
13.80.46.69 attack
 TCP (SYN) 13.80.46.69:1152 -> port 445, len 44
2020-10-02 15:41:47
85.93.20.122 attack
Repeated RDP login failures. Last user: administrator
2020-10-02 16:04:25
111.229.155.209 attack
Invalid user deploy from 111.229.155.209 port 38408
2020-10-02 16:00:46
222.186.30.35 attack
Oct  2 12:45:39 gw1 sshd[32737]: Failed password for root from 222.186.30.35 port 22454 ssh2
...
2020-10-02 15:51:08
193.57.40.15 attack
Repeated RDP login failures. Last user: Administrator
2020-10-02 16:05:22
121.201.124.41 attackbotsspam
1433/tcp 445/tcp 445/tcp
[2020-09-11/10-01]3pkt
2020-10-02 15:42:06
114.92.171.237 attack
1601584916 - 10/01/2020 22:41:56 Host: 114.92.171.237/114.92.171.237 Port: 445 TCP Blocked
2020-10-02 15:50:18
201.149.49.146 attack
Invalid user ali from 201.149.49.146 port 49624
2020-10-02 16:07:44
91.121.91.82 attackspam
Invalid user charles from 91.121.91.82 port 40444
2020-10-02 15:58:25
31.127.71.100 attackbotsspam
Unauthorized admin access - /admin/css/datepicker.css?v=913-new-social-icons92eae4f2550d5f47
2020-10-02 16:05:06
211.103.4.100 attackspam
Icarus honeypot on github
2020-10-02 15:36:20
46.146.240.185 attackbotsspam
SSH login attempts.
2020-10-02 15:59:46
181.188.163.156 attackbots
Repeated RDP login failures. Last user: Test
2020-10-02 16:03:26

Recently Reported IPs

64.211.41.226 61.78.158.138 214.147.169.20 219.235.252.102
161.221.252.127 26.243.188.51 1.192.108.152 179.232.126.229
180.195.221.126 153.114.117.254 144.137.13.33 116.151.111.94
6.74.153.51 129.60.238.227 123.188.188.193 84.246.42.36
88.42.232.69 75.62.27.111 169.204.51.74 240.245.98.144