Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.244.64.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53284
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.244.64.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:54:04 CST 2025
;; MSG SIZE  rcvd: 105
Host info
94.64.244.44.in-addr.arpa domain name pointer ec2-44-244-64-94.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.64.244.44.in-addr.arpa	name = ec2-44-244-64-94.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.49.212.34 attackbots
Dec615:43:06server4pure-ftpd:\(\?@59.49.212.34\)[WARNING]Authenticationfailedforuser[anonymous]Dec615:43:08server4pure-ftpd:\(\?@59.49.212.34\)[WARNING]Authenticationfailedforuser[forum-wbp]Dec615:43:40server4pure-ftpd:\(\?@59.49.212.34\)[WARNING]Authenticationfailedforuser[forum-wbp]Dec615:43:45server4pure-ftpd:\(\?@59.49.212.34\)[WARNING]Authenticationfailedforuser[www]Dec615:43:55server4pure-ftpd:\(\?@59.49.212.34\)[WARNING]Authenticationfailedforuser[www]Dec615:44:01server4pure-ftpd:\(\?@59.49.212.34\)[WARNING]Authenticationfailedforuser[www]Dec615:44:08server4pure-ftpd:\(\?@59.49.212.34\)[WARNING]Authenticationfailedforuser[forum-wbp]Dec615:44:14server4pure-ftpd:\(\?@59.49.212.34\)[WARNING]Authenticationfailedforuser[www]Dec615:44:19server4pure-ftpd:\(\?@59.49.212.34\)[WARNING]Authenticationfailedforuser[forum-wbp]Dec615:44:24server4pure-ftpd:\(\?@59.49.212.34\)[WARNING]Authenticationfailedforuser[forum-wbp]
2019-12-07 06:43:39
198.20.87.98 attack
Fail2Ban Ban Triggered
2019-12-07 06:32:59
139.59.61.134 attack
Dec  6 12:31:39 auw2 sshd\[4282\]: Invalid user dorney from 139.59.61.134
Dec  6 12:31:39 auw2 sshd\[4282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.61.134
Dec  6 12:31:41 auw2 sshd\[4282\]: Failed password for invalid user dorney from 139.59.61.134 port 43362 ssh2
Dec  6 12:38:05 auw2 sshd\[4997\]: Invalid user player from 139.59.61.134
Dec  6 12:38:05 auw2 sshd\[4997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.61.134
2019-12-07 06:49:15
125.124.143.62 attackbotsspam
detected by Fail2Ban
2019-12-07 06:30:44
190.2.147.222 attack
firewall-block, port(s): 9201/tcp
2019-12-07 06:16:51
200.51.46.243 attackspam
T: f2b postfix aggressive 3x
2019-12-07 06:33:31
210.242.67.17 attack
----- report -----
Dec  6 18:31:50 sshd: Connection from 210.242.67.17 port 47742
Dec  6 18:31:51 sshd: Invalid user amortegui from 210.242.67.17
Dec  6 18:31:53 sshd: Failed password for invalid user amortegui from 210.242.67.17 port 47742 ssh2
Dec  6 18:31:53 sshd: Received disconnect from 210.242.67.17: 11: Bye Bye [preauth]
Dec  6 18:38:04 sshd: Connection from 210.242.67.17 port 58702
Dec  6 18:38:05 sshd: Invalid user faxg from 210.242.67.17
Dec  6 18:38:08 sshd: Failed password for invalid user faxg from 210.242.67.17 port 58702 ssh2
Dec  6 18:38:08 sshd: Received disconnect from 210.242.67.17: 11: Bye Bye [preauth]
2019-12-07 06:21:05
218.54.175.51 attack
Automatic report - Banned IP Access
2019-12-07 06:18:16
222.186.42.4 attackspambots
Dec  6 23:19:32 SilenceServices sshd[14649]: Failed password for root from 222.186.42.4 port 2798 ssh2
Dec  6 23:19:42 SilenceServices sshd[14649]: Failed password for root from 222.186.42.4 port 2798 ssh2
Dec  6 23:19:46 SilenceServices sshd[14649]: Failed password for root from 222.186.42.4 port 2798 ssh2
Dec  6 23:19:46 SilenceServices sshd[14649]: error: maximum authentication attempts exceeded for root from 222.186.42.4 port 2798 ssh2 [preauth]
2019-12-07 06:20:33
123.142.108.122 attackspambots
Dec  6 23:08:47 vps691689 sshd[26317]: Failed password for root from 123.142.108.122 port 60866 ssh2
Dec  6 23:14:58 vps691689 sshd[26447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.108.122
...
2019-12-07 06:18:36
138.197.145.26 attackbots
Dec  6 12:09:20 hpm sshd\[7453\]: Invalid user info from 138.197.145.26
Dec  6 12:09:20 hpm sshd\[7453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.26
Dec  6 12:09:22 hpm sshd\[7453\]: Failed password for invalid user info from 138.197.145.26 port 57734 ssh2
Dec  6 12:15:07 hpm sshd\[8049\]: Invalid user frankie from 138.197.145.26
Dec  6 12:15:07 hpm sshd\[8049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.26
2019-12-07 06:22:34
177.126.85.149 attackspambots
Attempted to connect 2 times to port 23 TCP
2019-12-07 06:29:08
104.248.177.15 attack
104.248.177.15 - - \[06/Dec/2019:14:44:20 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.177.15 - - \[06/Dec/2019:14:44:21 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-12-07 06:47:57
167.114.47.68 attack
2019-12-06T21:21:38.113622hub.schaetter.us sshd\[10920\]: Invalid user tokuoka from 167.114.47.68 port 57982
2019-12-06T21:21:38.121872hub.schaetter.us sshd\[10920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns68.cloudnuvem.com.br
2019-12-06T21:21:40.624239hub.schaetter.us sshd\[10920\]: Failed password for invalid user tokuoka from 167.114.47.68 port 57982 ssh2
2019-12-06T21:27:32.631632hub.schaetter.us sshd\[11043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns68.cloudnuvem.com.br  user=root
2019-12-06T21:27:34.752658hub.schaetter.us sshd\[11043\]: Failed password for root from 167.114.47.68 port 34704 ssh2
...
2019-12-07 06:41:43
137.117.234.170 attack
Dec  6 12:31:22 web9 sshd\[15508\]: Invalid user monkey01 from 137.117.234.170
Dec  6 12:31:22 web9 sshd\[15508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.117.234.170
Dec  6 12:31:24 web9 sshd\[15508\]: Failed password for invalid user monkey01 from 137.117.234.170 port 49904 ssh2
Dec  6 12:37:43 web9 sshd\[16531\]: Invalid user crea from 137.117.234.170
Dec  6 12:37:43 web9 sshd\[16531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.117.234.170
2019-12-07 06:49:33

Recently Reported IPs

4.48.103.210 246.22.230.47 21.59.186.6 114.161.105.162
97.124.81.62 108.87.50.213 46.47.16.65 147.195.141.95
64.124.208.78 247.220.204.110 42.95.255.188 88.255.151.61
235.33.144.124 45.66.144.30 242.47.171.99 14.48.244.249
36.51.86.7 142.104.188.184 205.78.167.95 113.97.141.216