Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       44.0.0.0 - 44.191.255.255
CIDR:           44.128.0.0/10, 44.0.0.0/9
NetName:        AMPRNET
NetHandle:      NET-44-0-0-0-1
Parent:         NET44 (NET-44-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Amateur Radio Digital Communications (ARDC)
RegDate:        1992-07-01
Updated:        2024-11-07
Comment:        Geofeed https://portal.ampr.org/storage/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/44.0.0.0


OrgName:        Amateur Radio Digital Communications
OrgId:          ARDC
Address:        5663 Balboa Ave Suite 432
City:           San Diego
StateProv:      CA
PostalCode:     92111-2705
Country:        US
RegDate:        
Updated:        2025-01-17
Ref:            https://rdap.arin.net/registry/entity/ARDC


OrgTechHandle: LEWIS1112-ARIN
OrgTechName:   Lewis, Adam 
OrgTechPhone:  +1-858-477-9908 
OrgTechEmail:  adam@ardc.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LEWIS1112-ARIN

OrgAbuseHandle: BURWE9-ARIN
OrgAbuseName:   Burwell, John 
OrgAbusePhone:  +1-858-477-9900 
OrgAbuseEmail:  john@ardc.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/BURWE9-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.89.166.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7313
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.89.166.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012401 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 25 06:59:12 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 12.166.89.44.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.166.89.44.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.143.221.39 attack
3389/tcp 3389/tcp 3389/tcp...
[2019-05-15/07-15]21pkt,1pt.(tcp)
2019-07-16 07:54:13
112.217.236.234 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-07-01/15]6pkt,1pt.(tcp)
2019-07-16 07:55:47
157.230.183.255 attack
Jul 16 01:43:55 OPSO sshd\[1118\]: Invalid user postgres from 157.230.183.255 port 37468
Jul 16 01:43:55 OPSO sshd\[1118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.183.255
Jul 16 01:43:57 OPSO sshd\[1118\]: Failed password for invalid user postgres from 157.230.183.255 port 37468 ssh2
Jul 16 01:48:23 OPSO sshd\[1895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.183.255  user=root
Jul 16 01:48:25 OPSO sshd\[1895\]: Failed password for root from 157.230.183.255 port 36002 ssh2
2019-07-16 07:58:45
106.241.16.119 attackbotsspam
Jul 16 01:21:44 vps691689 sshd[15333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.16.119
Jul 16 01:21:46 vps691689 sshd[15333]: Failed password for invalid user b from 106.241.16.119 port 50572 ssh2
...
2019-07-16 07:38:11
200.72.197.147 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 16:05:07,288 INFO [amun_request_handler] PortScan Detected on Port: 445 (200.72.197.147)
2019-07-16 07:49:28
173.249.28.223 attack
Jul 16 01:51:10 s64-1 sshd[5549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.249.28.223
Jul 16 01:51:12 s64-1 sshd[5549]: Failed password for invalid user admin from 173.249.28.223 port 40078 ssh2
Jul 16 01:55:50 s64-1 sshd[5671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.249.28.223
...
2019-07-16 08:05:46
170.80.21.130 attack
445/tcp 445/tcp 445/tcp
[2019-07-05/15]3pkt
2019-07-16 08:04:01
220.83.161.249 attackspam
Jul 16 00:44:09 localhost sshd\[28278\]: Invalid user tim from 220.83.161.249 port 41226
Jul 16 00:44:09 localhost sshd\[28278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.83.161.249
...
2019-07-16 07:52:30
201.20.42.129 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 16:11:40,252 INFO [shellcode_manager] (201.20.42.129) no match, writing hexdump (2313cb37980eff02f00b69342fbaaeea :2114166) - MS17010 (EternalBlue)
2019-07-16 07:42:00
62.234.108.245 attack
Jul 16 05:15:11 vibhu-HP-Z238-Microtower-Workstation sshd\[18599\]: Invalid user misson from 62.234.108.245
Jul 16 05:15:11 vibhu-HP-Z238-Microtower-Workstation sshd\[18599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.108.245
Jul 16 05:15:13 vibhu-HP-Z238-Microtower-Workstation sshd\[18599\]: Failed password for invalid user misson from 62.234.108.245 port 58484 ssh2
Jul 16 05:18:53 vibhu-HP-Z238-Microtower-Workstation sshd\[19339\]: Invalid user jin from 62.234.108.245
Jul 16 05:18:53 vibhu-HP-Z238-Microtower-Workstation sshd\[19339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.108.245
...
2019-07-16 07:56:30
201.81.14.177 attack
Jul 15 19:21:36 legacy sshd[13526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.81.14.177
Jul 15 19:21:38 legacy sshd[13526]: Failed password for invalid user edu from 201.81.14.177 port 59014 ssh2
Jul 15 19:28:06 legacy sshd[13745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.81.14.177
...
2019-07-16 08:11:14
188.25.103.101 attack
Automatic report - Port Scan Attack
2019-07-16 08:18:27
178.128.75.154 attackbots
Jul 15 02:21:51 rb06 sshd[28561]: Failed password for invalid user program from 178.128.75.154 port 46300 ssh2
Jul 15 02:21:52 rb06 sshd[28561]: Received disconnect from 178.128.75.154: 11: Bye Bye [preauth]
Jul 15 02:29:11 rb06 sshd[4708]: Failed password for invalid user biology from 178.128.75.154 port 50760 ssh2
Jul 15 02:29:11 rb06 sshd[4708]: Received disconnect from 178.128.75.154: 11: Bye Bye [preauth]
Jul 15 02:33:51 rb06 sshd[5479]: Failed password for invalid user shao from 178.128.75.154 port 50402 ssh2
Jul 15 02:33:52 rb06 sshd[5479]: Received disconnect from 178.128.75.154: 11: Bye Bye [preauth]
Jul 15 02:38:22 rb06 sshd[8662]: Failed password for invalid user vivek from 178.128.75.154 port 50030 ssh2
Jul 15 02:38:22 rb06 sshd[8662]: Received disconnect from 178.128.75.154: 11: Bye Bye [preauth]
Jul 15 02:42:56 rb06 sshd[9186]: Failed password for invalid user web from 178.128.75.154 port 49688 ssh2
Jul 15 02:42:56 rb06 sshd[9186]: Received disconnect from........
-------------------------------
2019-07-16 07:48:36
122.154.178.174 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-25/07-15]8pkt,1pt.(tcp)
2019-07-16 07:49:53
14.241.120.92 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 22:51:03,114 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.241.120.92)
2019-07-16 07:33:43

Recently Reported IPs

39.98.55.206 154.219.7.1 194.187.178.41 74.48.136.168
20.65.193.155 47.251.142.10 3.80.228.212 109.236.61.69
31.56.146.236 111.90.120.22 44.89.166.53 99.108.141.40
44.89.166.75 192.142.25.95 44.89.166.90 88.250.255.76
88.250.255.194 74.137.24.199 42.48.38.43 14.212.94.201