Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fort Saskatchewan

Region: Alberta

Country: Canada

Internet Service Provider: Telus

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.53.109.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;198.53.109.44.			IN	A

;; AUTHORITY SECTION:
.			453	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071604 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 17 07:31:26 CST 2020
;; MSG SIZE  rcvd: 117
Host info
44.109.53.198.in-addr.arpa domain name pointer d198-53-109-44.abhsia.telus.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.109.53.198.in-addr.arpa	name = d198-53-109-44.abhsia.telus.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.52.61.227 attack
May 29 07:39:52 odroid64 sshd\[9708\]: User root from 218.52.61.227 not allowed because not listed in AllowUsers
May 29 07:39:52 odroid64 sshd\[9708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.52.61.227  user=root
...
2020-05-29 15:27:29
156.222.14.66 attackbotsspam
(EG/Egypt/-) SMTP Bruteforcing attempts
2020-05-29 15:17:50
117.131.60.38 attack
Invalid user securityagent from 117.131.60.38 port 19800
2020-05-29 15:24:47
190.210.182.179 attackbotsspam
Invalid user admin from 190.210.182.179 port 33802
2020-05-29 14:47:37
1.0.249.62 attackspambots
Automatic report - Port Scan Attack
2020-05-29 15:00:18
219.84.11.26 attack
port 23
2020-05-29 15:27:07
178.62.37.78 attackbotsspam
Invalid user ltelles from 178.62.37.78 port 46942
2020-05-29 15:16:49
156.202.220.186 attackbotsspam
(EG/Egypt/-) SMTP Bruteforcing attempts
2020-05-29 15:21:58
112.85.42.238 attack
May 29 05:53:33 web01 sshd[22545]: Failed password for root from 112.85.42.238 port 59037 ssh2
May 29 05:53:35 web01 sshd[22545]: Failed password for root from 112.85.42.238 port 59037 ssh2
...
2020-05-29 14:56:53
157.230.244.147 attackspam
Invalid user web76p3 from 157.230.244.147 port 39248
2020-05-29 15:13:01
220.132.215.33 attack
port 23
2020-05-29 15:12:50
58.215.121.36 attackbotsspam
Fail2Ban - SSH Bruteforce Attempt
2020-05-29 15:08:23
222.85.214.68 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-29 14:54:14
118.172.48.42 attackspambots
20/5/28@23:53:13: FAIL: Alarm-Network address from=118.172.48.42
20/5/28@23:53:14: FAIL: Alarm-Network address from=118.172.48.42
...
2020-05-29 15:14:25
168.196.40.12 attackbotsspam
<6 unauthorized SSH connections
2020-05-29 15:10:06

Recently Reported IPs

201.14.37.148 223.16.242.75 89.142.167.38 212.189.238.172
90.50.66.50 179.249.32.136 159.118.128.141 93.9.195.191
168.252.148.136 173.206.204.226 18.7.19.235 95.126.145.114
103.117.152.176 68.127.12.17 83.174.164.242 114.248.35.167
79.106.44.58 135.180.139.112 187.96.203.132 80.16.198.211