Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.157.204.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53748
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.157.204.244.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011601 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 17 01:32:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 244.204.157.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.204.157.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.227.63.3 attackbots
Invalid user zenobia from 109.227.63.3 port 57936
2020-04-02 09:00:41
51.68.200.151 attack
Port scan on 2 port(s): 139 445
2020-04-02 08:50:02
78.192.61.77 attackbots
FR_PROXAD-MNT_<177>1585775520 [1:2403426:56395] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 64 [Classification: Misc Attack] [Priority: 2]:  {TCP} 78.192.61.77:9446
2020-04-02 08:26:50
86.51.189.170 attack
Unauthorised access (Apr  2) SRC=86.51.189.170 LEN=48 TTL=112 ID=29916 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-02 08:22:40
105.229.52.149 attack
frenzy
2020-04-02 08:27:55
45.155.126.33 attackbotsspam
TCP src-port=52725   dst-port=25   Listed on   dnsbl-sorbs barracuda spamcop       (Project Honey Pot rated Suspicious)   (303)
2020-04-02 08:55:00
185.202.1.164 attackspambots
SSH-BruteForce
2020-04-02 09:03:36
218.92.0.148 attack
SSH-BruteForce
2020-04-02 09:01:09
112.35.62.225 attackbots
leo_www
2020-04-02 08:43:46
45.125.65.42 attackspambots
Apr  2 02:58:23 localhost postfix/smtpd[3840]: warning: unknown[45.125.65.42]: SASL LOGIN authentication failed: authentication failure
Apr  2 03:16:15 localhost postfix/smtpd[3965]: warning: unknown[45.125.65.42]: SASL LOGIN authentication failed: authentication failure
Apr  2 03:34:08 localhost postfix/smtpd[4540]: warning: unknown[45.125.65.42]: SASL LOGIN authentication failed: authentication failure
...
2020-04-02 08:44:31
178.254.0.104 attackbotsspam
xmlrpc attack
2020-04-02 08:27:05
84.39.183.160 attackbotsspam
Automatic report - Port Scan Attack
2020-04-02 08:40:32
58.221.7.174 attackspam
SSH brute force
2020-04-02 08:21:05
165.227.104.253 attackbots
Invalid user dxi from 165.227.104.253 port 43810
2020-04-02 08:54:12
37.139.13.105 attack
Apr  1 20:03:57 NPSTNNYC01T sshd[28453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105
Apr  1 20:04:00 NPSTNNYC01T sshd[28453]: Failed password for invalid user suporte from 37.139.13.105 port 59136 ssh2
Apr  1 20:05:47 NPSTNNYC01T sshd[28628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105
...
2020-04-02 08:42:11

Recently Reported IPs

80.144.231.33 215.209.242.247 54.76.33.105 67.193.113.139
42.39.114.9 45.6.87.36 63.164.97.130 233.86.57.228
75.160.158.53 183.16.237.107 131.240.253.152 76.168.174.131
77.254.92.254 88.18.81.14 96.98.54.29 3.167.255.195
134.19.249.157 31.61.116.241 178.54.216.31 58.37.70.239