Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.225.5.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33351
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.225.5.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:47:24 CST 2025
;; MSG SIZE  rcvd: 104
Host info
44.5.225.93.in-addr.arpa domain name pointer p5de1052c.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.5.225.93.in-addr.arpa	name = p5de1052c.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.166.160.40 attackbotsspam
Unauthorized connection attempt detected from IP address 218.166.160.40 to port 445
2020-07-17 03:07:41
189.163.69.92 attackspambots
Automatic report - Port Scan Attack
2020-07-17 03:08:29
192.241.238.208 attackspambots
ZGrab Application Layer Scanner Detection
2020-07-17 03:16:22
110.232.255.122 attack
Attempted connection to port 445.
2020-07-17 03:26:24
52.189.194.116 attack
Jul 16 20:28:32 sd-69548 sshd[650514]: Invalid user ec2-user from 52.189.194.116 port 2174
Jul 16 20:28:33 sd-69548 sshd[650514]: Disconnected from invalid user ec2-user 52.189.194.116 port 2174 [preauth]
...
2020-07-17 02:55:49
81.16.126.154 attack
1594907140 - 07/16/2020 15:45:40 Host: 81.16.126.154/81.16.126.154 Port: 445 TCP Blocked
2020-07-17 02:56:33
104.129.194.89 attackspambots
Jul 16 13:45:22 IngegnereFirenze sshd[23444]: Failed password for invalid user jian from 104.129.194.89 port 46013 ssh2
...
2020-07-17 03:30:54
187.58.192.9 attackspam
Icarus honeypot on github
2020-07-17 03:29:55
103.108.236.14 attackspam
Unauthorized connection attempt from IP address 103.108.236.14 on Port 445(SMB)
2020-07-17 03:29:14
62.122.136.243 attackspambots
postfix
2020-07-17 02:57:00
115.149.182.19 attack
Jul 16 15:45:19 debian-2gb-nbg1-2 kernel: \[17165678.534950\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=115.149.182.19 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=20173 PROTO=TCP SPT=44389 DPT=22624 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-17 03:33:37
220.135.8.176 attack
Attempted connection to port 88.
2020-07-17 03:07:15
171.231.34.245 attackbots
Attempted connection to port 445.
2020-07-17 03:21:29
190.107.22.251 attackbots
Attempted connection to port 445.
2020-07-17 03:16:40
179.221.36.41 attackspambots
Zeroshell Net Services Remote Command Execution Vulnerability
2020-07-17 03:12:06

Recently Reported IPs

79.235.9.18 194.92.23.72 242.228.186.139 62.189.185.51
229.15.92.2 127.93.215.168 206.183.114.133 133.244.80.255
130.189.47.244 8.128.169.185 95.179.24.91 135.242.234.3
133.196.153.251 81.91.36.117 210.230.179.72 222.132.50.138
213.233.111.228 3.162.39.249 195.120.29.2 212.145.221.250