Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Passau

Region: Bayern

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.202.44.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.202.44.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030701 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 04:09:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
104.44.202.93.in-addr.arpa domain name pointer p5dca2c68.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.44.202.93.in-addr.arpa	name = p5dca2c68.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.39.142.34 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 04:24:11
41.169.69.74 attackspambots
TCP port 3389: Scan and connection
2020-02-16 04:32:09
185.69.144.101 attack
20/2/15@12:46:13: FAIL: Alarm-Network address from=185.69.144.101
20/2/15@12:46:13: FAIL: Alarm-Network address from=185.69.144.101
...
2020-02-16 04:34:38
24.6.59.51 attackspambots
(sshd) Failed SSH login from 24.6.59.51 (US/United States/c-24-6-59-51.hsd1.ca.comcast.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 15 14:47:44 ubnt-55d23 sshd[31337]: Invalid user work from 24.6.59.51 port 43364
Feb 15 14:47:46 ubnt-55d23 sshd[31337]: Failed password for invalid user work from 24.6.59.51 port 43364 ssh2
2020-02-16 05:03:21
123.201.19.51 attackspam
Unauthorised access (Feb 15) SRC=123.201.19.51 LEN=44 TTL=246 ID=233 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Feb 12) SRC=123.201.19.51 LEN=44 TTL=246 ID=47141 TCP DPT=445 WINDOW=1024 SYN
2020-02-16 04:23:41
125.214.50.23 attack
1581774472 - 02/15/2020 14:47:52 Host: 125.214.50.23/125.214.50.23 Port: 445 TCP Blocked
2020-02-16 05:01:26
118.38.249.56 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 05:01:40
198.98.60.164 attackbots
Invalid user admin from 198.98.60.164 port 51867
2020-02-16 04:39:10
182.48.80.68 attack
SSH login attempts.
2020-02-16 04:59:36
118.39.0.48 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 04:38:13
210.99.13.245 attackspam
Jan  2 20:41:52 ms-srv sshd[675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.99.13.245
Jan  2 20:41:53 ms-srv sshd[675]: Failed password for invalid user dummy from 210.99.13.245 port 40244 ssh2
2020-02-16 04:44:42
168.227.64.223 attackspambots
Automatic report - Port Scan Attack
2020-02-16 04:23:23
118.39.137.214 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 04:33:07
54.37.149.233 attack
Automatic report - SSH Brute-Force Attack
2020-02-16 04:26:13
118.39.139.59 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 04:30:45

Recently Reported IPs

17.92.121.171 47.193.47.206 53.154.158.179 124.193.174.218
118.159.28.68 57.151.150.10 158.105.152.48 63.34.15.112
44.47.164.23 236.3.100.98 29.73.223.145 108.208.63.210
96.131.157.25 16.232.195.31 191.106.78.47 149.45.14.153
145.80.108.84 241.167.176.185 78.182.135.145 198.29.160.221