Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.1.44.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8995
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.1.44.159.			IN	A

;; AUTHORITY SECTION:
.			243	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020401 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 16:37:06 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 159.44.1.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.44.1.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.203.129.202 attackbotsspam
Unauthorized connection attempt from IP address 177.203.129.202 on Port 445(SMB)
2020-08-30 17:16:08
218.92.0.138 attackspam
Aug 30 10:26:04 rocket sshd[28234]: Failed password for root from 218.92.0.138 port 37630 ssh2
Aug 30 10:26:19 rocket sshd[28234]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 37630 ssh2 [preauth]
...
2020-08-30 17:29:23
203.218.170.101 attack
Attempted connection to port 5555.
2020-08-30 17:03:02
94.102.51.33 attackbots
[H1.VM6] Blocked by UFW
2020-08-30 16:57:18
194.114.131.86 attackbotsspam
Attempted connection to port 445.
2020-08-30 17:31:01
77.65.17.2 attackbotsspam
Aug 30 10:42:58 amit sshd\[31167\]: Invalid user bkp from 77.65.17.2
Aug 30 10:42:58 amit sshd\[31167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.65.17.2
Aug 30 10:43:00 amit sshd\[31167\]: Failed password for invalid user bkp from 77.65.17.2 port 58420 ssh2
...
2020-08-30 17:10:23
54.149.84.83 attackspam
Fail2Ban Ban Triggered
2020-08-30 16:58:48
223.204.238.155 attackbotsspam
Attempted connection to port 445.
2020-08-30 17:28:43
159.65.236.182 attackbots
prod6
...
2020-08-30 16:54:06
92.22.81.200 attackbotsspam
Attempted connection to port 37215.
2020-08-30 17:24:19
54.37.71.215 attackbots
Aug 29 19:46:17 php1 sshd\[2574\]: Invalid user dbuser from 54.37.71.215
Aug 29 19:46:17 php1 sshd\[2574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.215
Aug 29 19:46:19 php1 sshd\[2574\]: Failed password for invalid user dbuser from 54.37.71.215 port 50500 ssh2
Aug 29 19:52:48 php1 sshd\[3091\]: Invalid user 123 from 54.37.71.215
Aug 29 19:52:48 php1 sshd\[3091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.215
2020-08-30 17:24:51
94.217.219.229 attackspam
Attempted connection to port 25.
2020-08-30 17:22:51
51.195.167.73 attack
Attempted connection to port 8443.
2020-08-30 17:00:11
82.196.9.161 attackbots
Invalid user ytc from 82.196.9.161 port 41332
2020-08-30 17:12:47
179.27.60.34 attack
Aug 30 09:14:32 fhem-rasp sshd[30763]: Invalid user stas from 179.27.60.34 port 50889
...
2020-08-30 17:33:13

Recently Reported IPs

36.82.97.115 18.222.113.212 14.43.152.209 5.122.165.166
1.53.183.81 219.148.52.18 219.133.73.81 213.7.222.203
201.131.246.26 196.12.60.66 87.246.7.27 185.125.144.9
179.106.102.172 170.80.225.167 159.203.101.185 157.245.43.104
183.183.41.161 228.9.188.210 246.151.77.38 32.0.178.17