Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Calgary

Region: Alberta

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       207.54.96.0 - 207.54.125.255
CIDR:           207.54.112.0/21, 207.54.124.0/23, 207.54.96.0/20, 207.54.120.0/22
NetName:        TERAGO-1
NetHandle:      NET-207-54-96-0-1
Parent:         NET207 (NET-207-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   TeraGo Networks Inc. (TRGO)
RegDate:        2001-03-22
Updated:        2023-09-13
Comment:        ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref:            https://rdap.arin.net/registry/ip/207.54.96.0


OrgName:        TeraGo Networks Inc.
OrgId:          TRGO
Address:        Suite 800, 55 Commerce Valley Dr. West
City:           Thornhill
StateProv:      ON
PostalCode:     L3T-7V9
Country:        CA
RegDate:        2001-03-22
Updated:        2023-03-01
Comment:        http://www.terago.ca
Comment:        NOC hours 24/7
Ref:            https://rdap.arin.net/registry/entity/TRGO

ReferralServer:  rwhois://rwhois.rackforce.com:4321

OrgNOCHandle: TIN1-ARIN
OrgNOCName:   PTP NOC
OrgNOCPhone:  +1-866-837-2462 
OrgNOCEmail:  ipnoc@terago.ca
OrgNOCRef:    https://rdap.arin.net/registry/entity/TIN1-ARIN

OrgAbuseHandle: TIN1-ARIN
OrgAbuseName:   PTP NOC
OrgAbusePhone:  +1-866-837-2462 
OrgAbuseEmail:  ipnoc@terago.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/TIN1-ARIN

OrgTechHandle: JAINM16-ARIN
OrgTechName:   Jain, Manoj 
OrgTechPhone:  +1-647-291-4847 
OrgTechEmail:  manoj.jain@terago.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/JAINM16-ARIN

OrgTechHandle: TIP2-ARIN
OrgTechName:   TeraGo Internet Peering
OrgTechPhone:  +1-866-837-2462 
OrgTechEmail:  ipnoc@terago.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/TIP2-ARIN

RNOCHandle: TIN1-ARIN
RNOCName:   PTP NOC
RNOCPhone:  +1-866-837-2462 
RNOCEmail:  ipnoc@terago.ca
RNOCRef:    https://rdap.arin.net/registry/entity/TIN1-ARIN

RAbuseHandle: TIN1-ARIN
RAbuseName:   PTP NOC
RAbusePhone:  +1-866-837-2462 
RAbuseEmail:  ipnoc@terago.ca
RAbuseRef:    https://rdap.arin.net/registry/entity/TIN1-ARIN

RTechHandle: TIP2-ARIN
RTechName:   TeraGo Internet Peering
RTechPhone:  +1-866-837-2462 
RTechEmail:  ipnoc@terago.ca
RTechRef:    https://rdap.arin.net/registry/entity/TIP2-ARIN

# end


# start

NetRange:       207.54.113.224 - 207.54.113.255
CIDR:           207.54.113.224/27
NetName:        T-207054113224-021903
NetHandle:      NET-207-54-113-224-1
Parent:         TERAGO-1 (NET-207-54-96-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   National Gas Exchange (NGX) (NGEN)
RegDate:        2003-02-19
Updated:        2003-02-19
Ref:            https://rdap.arin.net/registry/ip/207.54.113.224


OrgName:        National Gas Exchange (NGX)
OrgId:          NGEN
Address:        #2330 140 4th Ave SW
City:           Calgary
StateProv:      AB
PostalCode:     T2P-3N3
Country:        CA
RegDate:        2003-02-19
Updated:        2011-09-24
Ref:            https://rdap.arin.net/registry/entity/NGEN


OrgTechHandle: CMI6-ARIN
OrgTechName:   Middleton, Corinne 
OrgTechPhone:  +1-403-974-1700 
OrgTechEmail:  corinne.middleton@ngx.com
OrgTechRef:    https://rdap.arin.net/registry/entity/CMI6-ARIN

OrgAbuseHandle: CMI6-ARIN
OrgAbuseName:   Middleton, Corinne 
OrgAbusePhone:  +1-403-974-1700 
OrgAbuseEmail:  corinne.middleton@ngx.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CMI6-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.rackforce.com:4321.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.54.113.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.54.113.238.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031701 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 18 04:52:41 CST 2026
;; MSG SIZE  rcvd: 107
Host info
238.113.54.207.in-addr.arpa domain name pointer static-207-54-113-238.ptr.terago.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
238.113.54.207.in-addr.arpa	name = static-207-54-113-238.ptr.terago.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.128.113.124 attackspambots
Nov 26 21:03:11 xzibhostname postfix/smtpd[27245]: warning: hostname ip-113-124.4vendeta.com does not resolve to address 78.128.113.124: Name or service not known
Nov 26 21:03:11 xzibhostname postfix/smtpd[27245]: connect from unknown[78.128.113.124]
Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: warning: unknown[78.128.113.124]: SASL LOGIN authentication failed: authentication failure
Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: lost connection after AUTH from unknown[78.128.113.124]
Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: disconnect from unknown[78.128.113.124]
Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: warning: hostname ip-113-124.4vendeta.com does not resolve to address 78.128.113.124: Name or service not known
Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: connect from unknown[78.128.113.124]
Nov 26 21:03:14 xzibhostname postfix/smtpd[27245]: warning: unknown[78.128.113.124]: SASL LOGIN authentication failed: authentication failure
........
-------------------------------
2019-11-30 13:50:22
111.198.54.177 attackbotsspam
2019-11-30T06:40:22.234321centos sshd\[14366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177  user=root
2019-11-30T06:40:24.242690centos sshd\[14366\]: Failed password for root from 111.198.54.177 port 49943 ssh2
2019-11-30T06:48:27.035204centos sshd\[14572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177  user=root
2019-11-30 13:49:02
71.6.135.131 attackspambots
11/30/2019-05:57:47.675642 71.6.135.131 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2019-11-30 13:45:59
212.129.140.89 attackspambots
Nov 30 06:46:08 dedicated sshd[27527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.140.89  user=root
Nov 30 06:46:09 dedicated sshd[27527]: Failed password for root from 212.129.140.89 port 47644 ssh2
2019-11-30 13:56:44
49.73.157.191 attack
SASL broute force
2019-11-30 13:26:21
222.186.180.41 attackbots
Nov 30 06:35:33 vps666546 sshd\[31648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Nov 30 06:35:35 vps666546 sshd\[31648\]: Failed password for root from 222.186.180.41 port 6034 ssh2
Nov 30 06:35:38 vps666546 sshd\[31648\]: Failed password for root from 222.186.180.41 port 6034 ssh2
Nov 30 06:35:42 vps666546 sshd\[31648\]: Failed password for root from 222.186.180.41 port 6034 ssh2
Nov 30 06:35:45 vps666546 sshd\[31648\]: Failed password for root from 222.186.180.41 port 6034 ssh2
...
2019-11-30 13:37:48
77.204.36.25 attackbots
Nov 30 05:57:57 vmanager6029 sshd\[5737\]: Invalid user ubnt from 77.204.36.25 port 32946
Nov 30 05:57:57 vmanager6029 sshd\[5737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.204.36.25
Nov 30 05:57:59 vmanager6029 sshd\[5737\]: Failed password for invalid user ubnt from 77.204.36.25 port 32946 ssh2
2019-11-30 13:35:35
122.155.11.55 attack
fail2ban honeypot
2019-11-30 13:28:05
118.24.201.132 attackbotsspam
Invalid user guest from 118.24.201.132 port 51580
2019-11-30 14:01:20
218.94.136.90 attackspam
Nov 30 05:53:21 legacy sshd[4680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90
Nov 30 05:53:23 legacy sshd[4680]: Failed password for invalid user seung from 218.94.136.90 port 49821 ssh2
Nov 30 05:57:58 legacy sshd[4845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90
...
2019-11-30 13:38:01
112.85.42.171 attackspambots
Nov 30 02:28:28 firewall sshd[1680]: Failed password for root from 112.85.42.171 port 42955 ssh2
Nov 30 02:28:28 firewall sshd[1680]: error: maximum authentication attempts exceeded for root from 112.85.42.171 port 42955 ssh2 [preauth]
Nov 30 02:28:28 firewall sshd[1680]: Disconnecting: Too many authentication failures [preauth]
...
2019-11-30 13:29:11
183.83.137.235 attackbots
19/11/29@23:57:35: FAIL: Alarm-Intrusion address from=183.83.137.235
...
2019-11-30 13:48:31
51.38.186.207 attack
Nov 30 05:57:53 * sshd[24730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.207
Nov 30 05:57:55 * sshd[24730]: Failed password for invalid user racho from 51.38.186.207 port 45092 ssh2
2019-11-30 13:41:28
92.50.151.170 attack
Nov 30 06:21:09 vps647732 sshd[24349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.151.170
Nov 30 06:21:10 vps647732 sshd[24349]: Failed password for invalid user cantournet from 92.50.151.170 port 48900 ssh2
...
2019-11-30 13:43:32
128.199.216.250 attackspambots
Nov 30 06:23:36 dedicated sshd[23396]: Invalid user dev from 128.199.216.250 port 41863
2019-11-30 13:54:53

Recently Reported IPs

45.76.202.157 45.76.202.124 68.183.206.32 74.249.178.114
35.241.166.201 188.166.178.184 139.59.116.9 221.241.183.80
217.149.163.193 217.104.210.219 216.27.114.30 212.161.91.208
54.205.241.255 54.163.179.109 13.218.68.64 44.236.88.213
178.128.214.41 13.218.97.192 36.142.78.49 14.212.94.38