Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       157.209.0.0 - 157.209.255.255
CIDR:           157.209.0.0/16
NetName:        THEHARTFORD
NetHandle:      NET-157-209-0-0-1
Parent:         NET157 (NET-157-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   HARTFORD FIRE INSURANCE COMPANY (HFI-18)
RegDate:        1992-01-29
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/157.209.0.0


OrgName:        HARTFORD FIRE INSURANCE COMPANY
OrgId:          HFI-18
Address:        690 ASYLUM AVENUE
City:           HARTFORD
StateProv:      CT
PostalCode:     06105-0001
Country:        US
RegDate:        2012-11-20
Updated:        2020-02-27
Ref:            https://rdap.arin.net/registry/entity/HFI-18


OrgAbuseHandle: ZH26-ARIN
OrgAbuseName:   Hartford Fire Insurance Co
OrgAbusePhone:  +1-860-547-5000 
OrgAbuseEmail:  dnsadmin@thehartford.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ZH26-ARIN

OrgTechHandle: ZH26-ARIN
OrgTechName:   Hartford Fire Insurance Co
OrgTechPhone:  +1-860-547-5000 
OrgTechEmail:  dnsadmin@thehartford.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZH26-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.209.93.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52496
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.209.93.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042100 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 22:53:07 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 244.93.209.157.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 157.209.93.244.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
49.69.152.54 attackspambots
Jul 30 03:32:12 lgrs-web sshd[6155]: Bad protocol version identification '' from 49.69.152.54 port 50989
Jul 30 03:32:13 lgrs-web sshd[6156]: Invalid user osbash from 49.69.152.54 port 51138
Jul 30 03:32:14 lgrs-web sshd[6156]: Connection closed by 49.69.152.54 port 51138 [preauth]
Jul 30 03:32:16 lgrs-web sshd[6158]: Invalid user plexuser from 49.69.152.54 port 51664
Jul 30 03:32:16 lgrs-web sshd[6158]: Connection closed by 49.69.152.54 port 51664 [preauth]
Jul 30 03:32:18 lgrs-web sshd[6162]: Invalid user pi from 49.69.152.54 port 52119
Jul 30 03:32:18 lgrs-web sshd[6162]: Connection closed by 49.69.152.54 port 52119 [preauth]
Jul 30 03:32:20 lgrs-web sshd[6164]: Invalid user pi from 49.69.152.54 port 52655
Jul 30 03:32:20 lgrs-web sshd[6164]: Connection closed by 49.69.152.54 port 52655 [preauth]
Jul 30 03:32:23 lgrs-web sshd[6168]: Invalid user pi from 49.69.152.54 port 53237
Jul 30 03:32:23 lgrs-web sshd[6168]: Connection closed by 49.69.152.54 port 53237 [preauth]........
-------------------------------
2019-07-31 01:32:03
47.60.141.81 attack
23/tcp
[2019-07-30]1pkt
2019-07-31 01:47:17
196.52.43.126 attack
Automatic report - Port Scan Attack
2019-07-31 01:24:49
85.209.0.115 attack
Port scan on 18 port(s): 10737 15300 17954 19323 21802 22523 23175 28469 28759 33733 33791 35717 37836 38095 39299 53596 56026 58342
2019-07-31 02:19:24
200.196.252.88 attack
445/tcp
[2019-07-30]1pkt
2019-07-31 02:23:06
2.186.112.131 attack
8080/tcp
[2019-07-30]1pkt
2019-07-31 02:08:31
37.6.117.155 attackbots
23/tcp
[2019-07-30]1pkt
2019-07-31 01:24:19
152.136.141.227 attack
Jul 30 15:42:20 lnxweb61 sshd[8617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.141.227
2019-07-31 02:18:35
187.188.169.123 attackbots
Jul 30 15:04:05 localhost sshd\[78133\]: Invalid user user from 187.188.169.123 port 34610
Jul 30 15:04:05 localhost sshd\[78133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.169.123
Jul 30 15:04:07 localhost sshd\[78133\]: Failed password for invalid user user from 187.188.169.123 port 34610 ssh2
Jul 30 15:09:13 localhost sshd\[78442\]: Invalid user ekain from 187.188.169.123 port 58102
Jul 30 15:09:13 localhost sshd\[78442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.169.123
...
2019-07-31 02:03:26
36.78.168.94 attackbots
445/tcp
[2019-07-30]1pkt
2019-07-31 02:07:11
185.100.87.246 attackbotsspam
RDP_Brute_Force
2019-07-31 02:20:57
103.21.149.89 attack
445/tcp
[2019-07-30]1pkt
2019-07-31 02:05:32
24.148.115.153 attackspam
Jul 30 16:45:38 thevastnessof sshd[2738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.148.115.153
...
2019-07-31 02:02:45
159.65.4.188 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-07-31 02:10:59
139.209.95.157 attackbots
3389/tcp 3389/tcp 3389/tcp
[2019-07-30]3pkt
2019-07-31 02:09:54

Recently Reported IPs

186.3.114.47 95.82.116.159 2606:4700:10::6814:7728 2606:4700:10::ac43:2097
2606:4700:10::6814:9388 2606:4700:10::6816:3587 2606:4700:10::6816:981 2606:4700:10::6814:9926
50.7.158.234 66.132.195.109 121.86.201.109 122.193.247.81
2606:4700:10::6816:1130 2606:4700:10::6816:1035 2606:4700:10::6814:5935 2606:4700:10::6814:5946
2606:4700:10::ac43:46e 2606:4700:10::6816:1548 2606:4700:10::6814:8331 43.130.105.246