Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: CTS Corporation

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attack
1579669017 - 01/22/2020 05:56:57 Host: 64.47.44.13/64.47.44.13 Port: 445 TCP Blocked
2020-01-22 13:16:19
attackbotsspam
Unauthorized connection attempt from IP address 64.47.44.13 on Port 445(SMB)
2019-07-13 10:29:44
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.47.44.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5418
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;64.47.44.13.			IN	A

;; AUTHORITY SECTION:
.			1482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071203 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 13 10:29:38 CST 2019
;; MSG SIZE  rcvd: 115
Host info
13.44.47.64.in-addr.arpa domain name pointer host-64-47-44-13.masergy.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
13.44.47.64.in-addr.arpa	name = host-64-47-44-13.masergy.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.15.62 attack
May 21 08:04:08 NPSTNNYC01T sshd[19212]: Failed password for root from 222.186.15.62 port 12482 ssh2
May 21 08:04:20 NPSTNNYC01T sshd[19221]: Failed password for root from 222.186.15.62 port 58961 ssh2
...
2020-05-21 20:13:34
198.108.66.251 attackspam
Unauthorized connection attempt detected from IP address 198.108.66.251 to port 14443
2020-05-21 20:03:19
62.210.114.58 attackspambots
Invalid user txf from 62.210.114.58 port 51270
2020-05-21 20:00:23
51.89.149.213 attackbotsspam
May 21 13:51:56 sso sshd[14322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.213
May 21 13:51:58 sso sshd[14322]: Failed password for invalid user kkc from 51.89.149.213 port 59752 ssh2
...
2020-05-21 20:05:01
201.40.244.146 attackspam
May 21 01:25:48 web9 sshd\[19639\]: Invalid user tjy from 201.40.244.146
May 21 01:25:48 web9 sshd\[19639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.40.244.146
May 21 01:25:50 web9 sshd\[19639\]: Failed password for invalid user tjy from 201.40.244.146 port 35290 ssh2
May 21 01:26:32 web9 sshd\[19750\]: Invalid user oyx from 201.40.244.146
May 21 01:26:32 web9 sshd\[19750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.40.244.146
2020-05-21 19:42:26
159.89.231.2 attack
May 21 09:00:47 ws12vmsma01 sshd[33346]: Invalid user yls from 159.89.231.2
May 21 09:00:48 ws12vmsma01 sshd[33346]: Failed password for invalid user yls from 159.89.231.2 port 56258 ssh2
May 21 09:04:52 ws12vmsma01 sshd[33953]: Invalid user kzp from 159.89.231.2
...
2020-05-21 20:08:29
46.161.27.75 attack
trying to access non-authorized port
2020-05-21 19:46:53
189.91.239.194 attackspambots
May 21 07:55:40 home sshd[27856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.91.239.194
May 21 07:55:41 home sshd[27856]: Failed password for invalid user ac from 189.91.239.194 port 59835 ssh2
May 21 07:57:06 home sshd[28040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.91.239.194
...
2020-05-21 19:45:16
65.229.5.158 attackspambots
May 21 14:04:11 pve1 sshd[27511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.229.5.158 
May 21 14:04:13 pve1 sshd[27511]: Failed password for invalid user hae from 65.229.5.158 port 57948 ssh2
...
2020-05-21 20:14:25
109.116.196.174 attack
Auto Fail2Ban report, multiple SSH login attempts.
2020-05-21 19:56:17
104.236.142.200 attack
$f2bV_matches
2020-05-21 19:52:09
60.177.88.45 attackspam
Brute force attempt
2020-05-21 19:56:40
51.38.57.78 attack
May 21 20:15:46 localhost sshd[944351]: Connection closed by 51.38.57.78 port 57400 [preauth]
...
2020-05-21 19:43:50
14.29.234.218 attackbots
Invalid user ozn from 14.29.234.218 port 39542
2020-05-21 20:04:29
67.169.77.173 attack
Repeated attempts against wp-login
2020-05-21 19:49:49

Recently Reported IPs

191.232.162.22 190.147.137.66 188.127.239.161 211.181.237.49
14.244.233.21 176.223.202.204 55.17.33.180 121.67.184.228
24.58.231.204 180.216.192.2 130.13.42.71 208.96.134.73
150.66.166.142 1.97.44.231 14.42.77.182 185.65.245.143
250.246.130.156 31.110.162.148 135.189.135.5 58.88.254.24