Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.245.49.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.245.49.220.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:00:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
220.49.245.44.in-addr.arpa domain name pointer ec2-44-245-49-220.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.49.245.44.in-addr.arpa	name = ec2-44-245-49-220.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.49.52.58 attackspambots
Jul 14 22:59:19 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=112.49.52.58 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=41527 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0 Jul 14 23:12:54 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=112.49.52.58 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=39234 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0 Jul 14 23:43:46 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=112.49.52.58 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=36612 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0 Jul 15 00:07:15 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=112.49.52.58 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=54758 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0 Jul 15 00:40:20 *hidden* kernel: [UF
...
2020-07-15 06:46:21
220.132.75.140 attackbotsspam
SSH Invalid Login
2020-07-15 07:19:36
192.35.169.48 attackspam
Brute force attack stopped by firewall
2020-07-15 06:50:04
181.10.18.188 attackspambots
Jul 15 00:32:06 jane sshd[30634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.10.18.188 
Jul 15 00:32:08 jane sshd[30634]: Failed password for invalid user ehkwon from 181.10.18.188 port 41870 ssh2
...
2020-07-15 06:43:18
79.100.92.68 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-15 06:51:42
89.248.168.217 attackspambots
07/14/2020-19:03:46.101893 89.248.168.217 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-07-15 07:09:51
112.85.42.104 attackspam
Jul 14 22:45:07 rush sshd[821]: Failed password for root from 112.85.42.104 port 13842 ssh2
Jul 14 22:45:18 rush sshd[824]: Failed password for root from 112.85.42.104 port 40459 ssh2
...
2020-07-15 06:45:50
124.67.69.174 attack
DATE:2020-07-14 20:25:42, IP:124.67.69.174, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-07-15 06:54:44
60.165.219.14 attack
Invalid user shiying from 60.165.219.14 port 32386
2020-07-15 07:20:44
180.247.160.117 attackbots
Automatic report - Port Scan Attack
2020-07-15 07:07:44
1.202.76.226 attackspambots
Jul 15 00:28:24 h2865660 sshd[22469]: Invalid user deploy from 1.202.76.226 port 28712
Jul 15 00:28:24 h2865660 sshd[22469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.76.226
Jul 15 00:28:24 h2865660 sshd[22469]: Invalid user deploy from 1.202.76.226 port 28712
Jul 15 00:28:26 h2865660 sshd[22469]: Failed password for invalid user deploy from 1.202.76.226 port 28712 ssh2
Jul 15 00:40:36 h2865660 sshd[23094]: Invalid user libuuid from 1.202.76.226 port 20926
...
2020-07-15 07:10:59
77.68.27.212 attack
2020/07/14 23:07:03 [error] 20617#20617: *8241354 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 77.68.27.212, server: _, request: "GET /wp-login.php HTTP/1.1", host: "freifunk-wermelskirchen.de"
2020/07/14 23:07:03 [error] 20617#20617: *8241356 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 77.68.27.212, server: _, request: "POST /wp-login.php HTTP/1.1", host: "freifunk-wermelskirchen.de"
2020-07-15 06:52:30
52.237.198.200 attack
Invalid user marias from 52.237.198.200 port 51052
2020-07-15 07:18:21
104.236.214.8 attackbots
Invalid user show from 104.236.214.8 port 50439
2020-07-15 06:55:45
190.83.208.15 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-07-15 07:02:54

Recently Reported IPs

29.209.44.68 47.242.116.57 52.215.234.146 193.174.248.75
55.27.172.93 166.184.9.150 8.167.161.218 5.42.9.249
58.241.224.220 245.17.255.2 212.61.55.182 130.199.127.115
251.6.96.193 224.212.69.46 98.150.6.14 227.102.203.178
171.254.56.12 231.192.159.177 147.243.165.236 250.120.115.237