Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.94.189.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6335
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.94.189.48.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 10:46:23 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 48.189.94.44.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.189.94.44.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
64.107.80.14 attackbotsspam
2019-12-06T03:24:51.184646-07:00 suse-nuc sshd[9855]: Invalid user backup from 64.107.80.14 port 40348
...
2019-12-06 19:42:47
68.49.185.238 attackbots
Host Scan
2019-12-06 19:18:45
91.121.211.59 attack
Dec  6 01:39:45 kapalua sshd\[9830\]: Invalid user lisa from 91.121.211.59
Dec  6 01:39:45 kapalua sshd\[9830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu
Dec  6 01:39:48 kapalua sshd\[9830\]: Failed password for invalid user lisa from 91.121.211.59 port 59786 ssh2
Dec  6 01:45:05 kapalua sshd\[10342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu  user=root
Dec  6 01:45:08 kapalua sshd\[10342\]: Failed password for root from 91.121.211.59 port 40790 ssh2
2019-12-06 19:47:03
163.172.176.138 attackspambots
Dec  6 10:17:06 sd-53420 sshd\[15113\]: Invalid user shen from 163.172.176.138
Dec  6 10:17:06 sd-53420 sshd\[15113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.176.138
Dec  6 10:17:09 sd-53420 sshd\[15113\]: Failed password for invalid user shen from 163.172.176.138 port 37232 ssh2
Dec  6 10:22:29 sd-53420 sshd\[16084\]: Invalid user \*\*\*\*\*\*\*\* from 163.172.176.138
Dec  6 10:22:29 sd-53420 sshd\[16084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.176.138
...
2019-12-06 19:55:26
210.212.194.113 attack
Dec  6 11:48:46 MK-Soft-VM5 sshd[28331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.194.113 
Dec  6 11:48:48 MK-Soft-VM5 sshd[28331]: Failed password for invalid user lashonn from 210.212.194.113 port 49450 ssh2
...
2019-12-06 19:47:51
222.186.175.155 attack
Dec  6 12:01:21 h2779839 sshd[10830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Dec  6 12:01:24 h2779839 sshd[10830]: Failed password for root from 222.186.175.155 port 62604 ssh2
Dec  6 12:01:37 h2779839 sshd[10830]: error: maximum authentication attempts exceeded for root from 222.186.175.155 port 62604 ssh2 [preauth]
Dec  6 12:01:21 h2779839 sshd[10830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Dec  6 12:01:24 h2779839 sshd[10830]: Failed password for root from 222.186.175.155 port 62604 ssh2
Dec  6 12:01:37 h2779839 sshd[10830]: error: maximum authentication attempts exceeded for root from 222.186.175.155 port 62604 ssh2 [preauth]
Dec  6 12:01:41 h2779839 sshd[10837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Dec  6 12:01:42 h2779839 sshd[10837]: Failed password for
...
2019-12-06 19:17:37
58.252.6.76 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-06 19:43:08
179.35.113.32 attackbotsspam
Host Scan
2019-12-06 19:52:12
129.211.166.249 attack
2019-12-06T07:00:17.611616shield sshd\[7375\]: Invalid user mulero from 129.211.166.249 port 60868
2019-12-06T07:00:17.615909shield sshd\[7375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.166.249
2019-12-06T07:00:19.851168shield sshd\[7375\]: Failed password for invalid user mulero from 129.211.166.249 port 60868 ssh2
2019-12-06T07:07:14.312186shield sshd\[9318\]: Invalid user host from 129.211.166.249 port 42960
2019-12-06T07:07:14.316439shield sshd\[9318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.166.249
2019-12-06 19:32:28
181.41.216.136 attackbotsspam
SMTP blocked logins: 147. Dates: 26-11-2019 / 6-12-2019Logins on unknown users: 198. Dates: 26-11-2019 / 6-12-2019
2019-12-06 19:53:50
71.6.146.186 attackspam
" "
2019-12-06 19:50:36
165.22.211.73 attack
Dec  6 18:31:21 webhost01 sshd[21562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.211.73
Dec  6 18:31:23 webhost01 sshd[21562]: Failed password for invalid user hirashima from 165.22.211.73 port 46396 ssh2
...
2019-12-06 19:50:18
180.66.207.67 attackspambots
Dec  6 16:52:57 webhost01 sshd[19824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.66.207.67
Dec  6 16:52:59 webhost01 sshd[19824]: Failed password for invalid user wayne from 180.66.207.67 port 48734 ssh2
...
2019-12-06 19:45:06
163.172.204.185 attackspambots
Dec  6 11:12:53 markkoudstaal sshd[23747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185
Dec  6 11:12:55 markkoudstaal sshd[23747]: Failed password for invalid user haagensli from 163.172.204.185 port 58587 ssh2
Dec  6 11:20:51 markkoudstaal sshd[24652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185
2019-12-06 19:28:04
219.239.47.66 attack
Oct 30 14:07:48 vtv3 sshd[7401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66  user=root
Oct 30 14:07:49 vtv3 sshd[7401]: Failed password for root from 219.239.47.66 port 50080 ssh2
Oct 30 14:12:16 vtv3 sshd[9779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66  user=root
Oct 30 14:25:42 vtv3 sshd[16771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66  user=root
Oct 30 14:25:44 vtv3 sshd[16771]: Failed password for root from 219.239.47.66 port 60652 ssh2
Oct 30 14:30:16 vtv3 sshd[19070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66  user=root
Oct 30 14:30:18 vtv3 sshd[19070]: Failed password for root from 219.239.47.66 port 35060 ssh2
Oct 30 14:34:50 vtv3 sshd[21091]: Invalid user user from 219.239.47.66 port 37716
Oct 30 14:48:35 vtv3 sshd[28087]: pam_unix(sshd:auth): authentication failu
2019-12-06 19:20:09

Recently Reported IPs

227.158.142.120 221.197.186.221 227.177.25.175 187.254.42.96
89.209.181.173 44.41.239.26 176.35.14.5 57.61.150.20
233.226.64.95 24.239.245.94 106.22.183.202 152.237.210.203
135.254.59.151 5.20.62.90 189.7.61.110 150.2.248.45
189.136.40.226 206.197.178.34 123.132.229.72 34.207.217.89