Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.97.239.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.97.239.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 03:44:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 244.239.97.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.239.97.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
132.148.129.180 attackbots
$f2bV_matches
2020-01-12 01:26:08
107.170.249.6 attackspam
Unauthorized connection attempt detected from IP address 107.170.249.6 to port 2220 [J]
2020-01-12 01:54:28
133.130.90.174 attack
$f2bV_matches
2020-01-12 01:14:44
13.78.49.127 attack
$f2bV_matches
2020-01-12 01:37:41
179.113.82.228 attackspambots
20/1/11@08:08:37: FAIL: Alarm-Network address from=179.113.82.228
...
2020-01-12 01:52:57
118.34.37.145 attack
Failed password for invalid user paul from 118.34.37.145 port 42950 ssh2
Invalid user usuario from 118.34.37.145 port 46938
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.37.145
Failed password for invalid user usuario from 118.34.37.145 port 46938 ssh2
Invalid user wubao from 118.34.37.145 port 50904
2020-01-12 01:37:02
222.186.180.8 attackspam
Jan 11 18:31:10 MK-Soft-Root2 sshd[11207]: Failed password for root from 222.186.180.8 port 21336 ssh2
Jan 11 18:31:15 MK-Soft-Root2 sshd[11207]: Failed password for root from 222.186.180.8 port 21336 ssh2
...
2020-01-12 01:33:07
130.61.118.231 attackbotsspam
$f2bV_matches
2020-01-12 01:33:47
131.221.80.129 attack
$f2bV_matches
2020-01-12 01:29:10
37.29.15.90 attack
20/1/11@08:08:58: FAIL: Alarm-Network address from=37.29.15.90
...
2020-01-12 01:23:06
13.125.8.27 attackspambots
$f2bV_matches
2020-01-12 01:42:33
13.94.43.10 attackbotsspam
Jan 11 18:24:13 vpn01 sshd[27664]: Failed password for root from 13.94.43.10 port 39506 ssh2
...
2020-01-12 01:36:40
129.28.31.102 attackspambots
$f2bV_matches
2020-01-12 01:43:43
132.145.166.31 attackspambots
$f2bV_matches
2020-01-12 01:27:15
129.211.77.44 attackspambots
$f2bV_matches
2020-01-12 01:49:26

Recently Reported IPs

160.65.103.213 47.84.83.215 13.232.20.44 97.97.220.179
88.128.49.238 2.206.114.23 121.130.253.11 238.182.167.232
207.30.37.52 214.237.88.39 110.197.2.87 83.207.241.83
187.52.93.130 27.215.87.47 13.184.42.28 106.4.170.236
44.216.184.74 154.250.131.237 87.124.208.187 232.138.99.143