Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.46.220.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37657
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.46.220.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 18:12:33 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 8.220.46.44.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.220.46.44.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.62.103.39 attack
Fail2Ban Ban Triggered
2020-01-11 15:34:47
87.188.57.112 attack
RDP Bruteforce
2020-01-11 15:22:15
5.152.159.31 attackspambots
Jan 11 06:57:56 vps58358 sshd\[3548\]: Invalid user teamspeak from 5.152.159.31Jan 11 06:57:59 vps58358 sshd\[3548\]: Failed password for invalid user teamspeak from 5.152.159.31 port 48945 ssh2Jan 11 07:01:02 vps58358 sshd\[3561\]: Failed password for root from 5.152.159.31 port 36794 ssh2Jan 11 07:04:08 vps58358 sshd\[3573\]: Failed password for root from 5.152.159.31 port 52877 ssh2Jan 11 07:07:13 vps58358 sshd\[3592\]: Invalid user bzt from 5.152.159.31Jan 11 07:07:15 vps58358 sshd\[3592\]: Failed password for invalid user bzt from 5.152.159.31 port 40731 ssh2
...
2020-01-11 15:10:02
157.7.52.201 attack
Jan 11 08:58:05 server sshd\[29204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=m720x.dwzumq.tokyo  user=root
Jan 11 08:58:07 server sshd\[29204\]: Failed password for root from 157.7.52.201 port 51629 ssh2
Jan 11 09:11:11 server sshd\[520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=m720x.dwzumq.tokyo  user=root
Jan 11 09:11:14 server sshd\[520\]: Failed password for root from 157.7.52.201 port 32941 ssh2
Jan 11 09:13:42 server sshd\[924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=m720x.dwzumq.tokyo  user=root
...
2020-01-11 15:23:16
113.128.185.142 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-01-2020 04:55:09.
2020-01-11 15:33:15
115.186.188.53 attackbotsspam
Jan 11 05:55:11 [host] sshd[22681]: Invalid user wzl from 115.186.188.53
Jan 11 05:55:11 [host] sshd[22681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.186.188.53
Jan 11 05:55:12 [host] sshd[22681]: Failed password for invalid user wzl from 115.186.188.53 port 60548 ssh2
2020-01-11 15:32:39
117.144.188.221 attackbots
Jan 11 06:53:25 ovpn sshd\[4151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.144.188.221  user=root
Jan 11 06:53:27 ovpn sshd\[4151\]: Failed password for root from 117.144.188.221 port 44188 ssh2
Jan 11 07:08:37 ovpn sshd\[8068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.144.188.221  user=root
Jan 11 07:08:39 ovpn sshd\[8068\]: Failed password for root from 117.144.188.221 port 41678 ssh2
Jan 11 07:11:33 ovpn sshd\[8791\]: Invalid user support from 117.144.188.221
Jan 11 07:11:33 ovpn sshd\[8791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.144.188.221
2020-01-11 15:35:16
46.29.15.111 attackspam
spam
2020-01-11 15:18:35
58.71.223.173 attack
1578718544 - 01/11/2020 05:55:44 Host: 58.71.223.173/58.71.223.173 Port: 445 TCP Blocked
2020-01-11 15:19:34
49.149.97.8 attackbotsspam
Unauthorised access (Jan 11) SRC=49.149.97.8 LEN=52 TTL=117 ID=11478 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-11 15:07:08
45.125.66.58 attackspambots
Rude login attack (2 tries in 1d)
2020-01-11 15:24:00
46.38.144.179 attackbots
Jan 11 07:57:46 vmanager6029 postfix/smtpd\[31025\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 11 07:58:32 vmanager6029 postfix/smtpd\[31025\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-11 15:09:43
222.186.175.147 attackbotsspam
Jan 11 08:40:35 srv-ubuntu-dev3 sshd[101685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147  user=root
Jan 11 08:40:36 srv-ubuntu-dev3 sshd[101685]: Failed password for root from 222.186.175.147 port 52556 ssh2
Jan 11 08:40:46 srv-ubuntu-dev3 sshd[101685]: Failed password for root from 222.186.175.147 port 52556 ssh2
Jan 11 08:40:35 srv-ubuntu-dev3 sshd[101685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147  user=root
Jan 11 08:40:36 srv-ubuntu-dev3 sshd[101685]: Failed password for root from 222.186.175.147 port 52556 ssh2
Jan 11 08:40:46 srv-ubuntu-dev3 sshd[101685]: Failed password for root from 222.186.175.147 port 52556 ssh2
Jan 11 08:40:35 srv-ubuntu-dev3 sshd[101685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147  user=root
Jan 11 08:40:36 srv-ubuntu-dev3 sshd[101685]: Failed password for root from 222.186.1
...
2020-01-11 15:42:28
62.234.91.173 attackbots
Jan 11 08:00:25 server sshd\[15183\]: Invalid user syz from 62.234.91.173
Jan 11 08:00:25 server sshd\[15183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.173 
Jan 11 08:00:28 server sshd\[15183\]: Failed password for invalid user syz from 62.234.91.173 port 44165 ssh2
Jan 11 08:07:34 server sshd\[16646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.173  user=root
Jan 11 08:07:36 server sshd\[16646\]: Failed password for root from 62.234.91.173 port 36478 ssh2
...
2020-01-11 15:25:20
37.187.72.12 attack
Automatic report - XMLRPC Attack
2020-01-11 15:12:58

Recently Reported IPs

207.71.76.245 198.100.31.118 129.160.60.39 219.28.219.129
30.31.199.129 13.67.30.12 165.179.190.69 239.74.197.167
133.209.103.200 254.152.162.173 96.90.143.137 101.238.156.19
248.193.14.30 8.77.174.222 219.190.30.200 211.186.172.90
254.53.1.238 8.7.219.138 211.96.236.249 66.155.36.91