Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.44.91.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29483
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.44.91.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 20:13:43 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 54.91.44.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.91.44.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.70.160.187 attack
66.70.160.187 - - [13/Apr/2020:19:20:17 +0200] "GET /wp-login.php HTTP/1.1" 200 5879 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.70.160.187 - - [13/Apr/2020:19:20:19 +0200] "POST /wp-login.php HTTP/1.1" 200 6778 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.70.160.187 - - [13/Apr/2020:19:20:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-14 02:06:04
51.75.241.233 attackbotsspam
2020-04-13T19:19:35.228950vps751288.ovh.net sshd\[2044\]: Invalid user mine from 51.75.241.233 port 60810
2020-04-13T19:19:35.239647vps751288.ovh.net sshd\[2044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3131537.ip-51-75-241.eu
2020-04-13T19:19:37.052780vps751288.ovh.net sshd\[2044\]: Failed password for invalid user mine from 51.75.241.233 port 60810 ssh2
2020-04-13T19:20:32.441809vps751288.ovh.net sshd\[2054\]: Invalid user mine from 51.75.241.233 port 59762
2020-04-13T19:20:32.448572vps751288.ovh.net sshd\[2054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3131537.ip-51-75-241.eu
2020-04-14 01:53:56
222.186.173.142 attackspam
Apr 13 19:53:40 pve sshd[26892]: Failed password for root from 222.186.173.142 port 4420 ssh2
Apr 13 19:53:44 pve sshd[26892]: Failed password for root from 222.186.173.142 port 4420 ssh2
Apr 13 19:53:47 pve sshd[26892]: Failed password for root from 222.186.173.142 port 4420 ssh2
Apr 13 19:53:52 pve sshd[26892]: Failed password for root from 222.186.173.142 port 4420 ssh2
2020-04-14 01:57:18
114.106.76.25 attackbots
Apr 14 03:15:49 our-server-hostname postfix/smtpd[4124]: connect from unknown[114.106.76.25]
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.106.76.25
2020-04-14 01:42:04
162.243.133.158 attackbotsspam
firewall-block, port(s): 636/tcp
2020-04-14 02:06:52
119.252.174.195 attack
Apr 13 17:50:47 game-panel sshd[25606]: Failed password for root from 119.252.174.195 port 56400 ssh2
Apr 13 17:55:14 game-panel sshd[25854]: Failed password for root from 119.252.174.195 port 36182 ssh2
2020-04-14 02:12:59
80.82.77.193 attackbots
80.82.77.193 was recorded 8 times by 8 hosts attempting to connect to the following ports: 523. Incident counter (4h, 24h, all-time): 8, 8, 816
2020-04-14 02:09:16
103.120.168.125 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 13-04-2020 18:20:08.
2020-04-14 02:19:00
106.54.140.71 attackbots
Apr 13 19:53:33 mout sshd[4261]: Invalid user vt100 from 106.54.140.71 port 58202
2020-04-14 02:07:28
139.99.91.132 attackspam
"Unauthorized connection attempt on SSHD detected"
2020-04-14 01:49:00
114.106.156.193 attack
Apr 14 03:16:04 our-server-hostname postfix/smtpd[2470]: connect from unknown[114.106.156.193]
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.106.156.193
2020-04-14 01:44:52
91.212.38.210 attackspam
SIP Server BruteForce Attack
2020-04-14 02:19:20
144.217.34.148 attack
144.217.34.148 was recorded 9 times by 9 hosts attempting to connect to the following ports: 3283. Incident counter (4h, 24h, all-time): 9, 33, 1864
2020-04-14 01:41:42
113.204.205.66 attackspam
2020-04-13T17:11:25.956992abusebot-2.cloudsearch.cf sshd[19715]: Invalid user semenzato from 113.204.205.66 port 45008
2020-04-13T17:11:25.963371abusebot-2.cloudsearch.cf sshd[19715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.204.205.66
2020-04-13T17:11:25.956992abusebot-2.cloudsearch.cf sshd[19715]: Invalid user semenzato from 113.204.205.66 port 45008
2020-04-13T17:11:27.505394abusebot-2.cloudsearch.cf sshd[19715]: Failed password for invalid user semenzato from 113.204.205.66 port 45008 ssh2
2020-04-13T17:18:16.093181abusebot-2.cloudsearch.cf sshd[20109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.204.205.66  user=root
2020-04-13T17:18:18.056990abusebot-2.cloudsearch.cf sshd[20109]: Failed password for root from 113.204.205.66 port 50112 ssh2
2020-04-13T17:20:38.578462abusebot-2.cloudsearch.cf sshd[20237]: Invalid user in from 113.204.205.66 port 42869
...
2020-04-14 01:49:33
121.229.26.104 attackspambots
Apr 13 19:43:43 plex sshd[29622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.26.104  user=root
Apr 13 19:43:44 plex sshd[29622]: Failed password for root from 121.229.26.104 port 44362 ssh2
2020-04-14 01:52:15

Recently Reported IPs

160.94.121.146 188.74.223.51 32.100.197.190 119.69.125.142
94.184.50.50 181.98.137.174 58.47.72.15 93.88.32.196
164.233.7.112 41.150.80.11 28.227.5.114 97.99.41.43
88.161.241.161 76.217.156.199 166.13.144.198 239.94.139.83
76.115.79.247 237.84.225.124 42.41.254.69 232.23.220.183