Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.159.44.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;53.159.44.120.			IN	A

;; AUTHORITY SECTION:
.			356	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011200 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 21:05:49 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 120.44.159.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.44.159.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.38.150.72 attackbotsspam
Jun 30 01:44:23 v22019058497090703 postfix/smtpd[15322]: warning: unknown[46.38.150.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 30 01:45:23 v22019058497090703 postfix/smtpd[15322]: warning: unknown[46.38.150.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 30 01:46:22 v22019058497090703 postfix/smtpd[15322]: warning: unknown[46.38.150.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-30 07:50:20
177.55.195.215 attackbots
Honeypot attack, port: 445, PTR: 177-55-195-215.static.sumicity.net.br.
2020-06-30 07:54:17
177.52.255.67 attackspambots
Jun 29 22:41:50 pbkit sshd[572067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.52.255.67 
Jun 29 22:41:50 pbkit sshd[572067]: Invalid user jim from 177.52.255.67 port 54280
Jun 29 22:41:52 pbkit sshd[572067]: Failed password for invalid user jim from 177.52.255.67 port 54280 ssh2
...
2020-06-30 08:22:00
79.106.170.58 attack
Unauthorized connection attempt from IP address 79.106.170.58 on Port 445(SMB)
2020-06-30 08:11:12
37.49.224.224 attack
Attempted to connect 2 times to port 22 TCP
2020-06-30 08:04:58
103.16.133.19 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-30 07:57:49
38.132.99.195 attackspambots
Possible port scan detected
2020-06-30 07:53:27
103.97.213.136 attack
Unauthorized connection attempt from IP address 103.97.213.136 on Port 445(SMB)
2020-06-30 08:07:54
78.85.21.52 attack
Unauthorized connection attempt from IP address 78.85.21.52 on Port 445(SMB)
2020-06-30 08:10:06
62.234.83.50 attack
Jun 30 02:40:50 itv-usvr-02 sshd[4330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.83.50  user=root
Jun 30 02:43:41 itv-usvr-02 sshd[4452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.83.50  user=bin
Jun 30 02:46:13 itv-usvr-02 sshd[4605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.83.50
2020-06-30 07:54:31
129.204.45.15 attackspambots
Fail2Ban Ban Triggered
2020-06-30 08:01:47
145.239.92.211 attackspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-06-30 08:02:46
36.91.145.99 attackspam
Unauthorized connection attempt from IP address 36.91.145.99 on Port 445(SMB)
2020-06-30 08:15:25
110.25.93.37 attackbotsspam
Honeypot attack, port: 5555, PTR: 110-25-93-37.adsl.fetnet.net.
2020-06-30 08:29:12
140.238.13.206 attackbotsspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-06-30 07:59:42

Recently Reported IPs

124.94.48.223 141.226.54.217 121.183.168.243 3.90.231.202
3.91.205.155 51.68.199.166 115.148.72.17 94.254.74.81
101.101.30.209 14.163.156.16 176.109.244.6 79.31.209.216
117.78.15.148 5.58.234.229 110.153.77.244 37.139.17.189
47.111.229.241 123.21.111.114 129.213.107.56 118.107.45.198