Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.5.99.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22874
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.5.99.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 06:07:15 CST 2025
;; MSG SIZE  rcvd: 102
Host info
Host 53.99.5.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.99.5.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.113.225.208 attackbotsspam
Aug 31 22:30:37 dax sshd[9140]: warning: /etc/hosts.deny, line 15136: can't verify hostname: getaddrinfo(187.113.225.208.static.host.gvt.net.br, AF_INET) failed
Aug 31 22:30:38 dax sshd[9140]: reveeclipse mapping checking getaddrinfo for 187.113.225.208.static.host.gvt.net.br [187.113.225.208] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 31 22:30:38 dax sshd[9140]: Invalid user ryana from 187.113.225.208
Aug 31 22:30:38 dax sshd[9140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.113.225.208 
Aug 31 22:30:41 dax sshd[9140]: Failed password for invalid user ryana from 187.113.225.208 port 60921 ssh2
Aug 31 22:30:41 dax sshd[9140]: Received disconnect from 187.113.225.208: 11: Bye Bye [preauth]
Aug 31 22:38:14 dax sshd[10077]: warning: /etc/hosts.deny, line 15136: can't verify hostname: getaddrinfo(187.113.225.208.static.host.gvt.net.br, AF_INET) failed
Aug 31 22:38:16 dax sshd[10077]: reveeclipse mapping checking getaddrinfo for ........
-------------------------------
2019-09-01 11:03:51
141.98.9.67 attackbots
Sep  1 04:49:02 ncomp postfix/smtpd[18256]: warning: unknown[141.98.9.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 04:49:46 ncomp postfix/smtpd[18256]: warning: unknown[141.98.9.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 04:50:29 ncomp postfix/smtpd[18256]: warning: unknown[141.98.9.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-01 10:50:47
81.130.161.44 attackbots
SSH-bruteforce attempts
2019-09-01 11:21:48
106.13.105.77 attackspambots
Aug 31 16:39:00 eddieflores sshd\[17722\]: Invalid user 123 from 106.13.105.77
Aug 31 16:39:00 eddieflores sshd\[17722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.77
Aug 31 16:39:02 eddieflores sshd\[17722\]: Failed password for invalid user 123 from 106.13.105.77 port 45274 ssh2
Aug 31 16:42:24 eddieflores sshd\[18114\]: Invalid user 1qaz2wsx from 106.13.105.77
Aug 31 16:42:24 eddieflores sshd\[18114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.77
2019-09-01 11:26:58
185.35.139.72 attack
Aug 31 23:00:01 TORMINT sshd\[11635\]: Invalid user ali from 185.35.139.72
Aug 31 23:00:01 TORMINT sshd\[11635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.35.139.72
Aug 31 23:00:03 TORMINT sshd\[11635\]: Failed password for invalid user ali from 185.35.139.72 port 54634 ssh2
...
2019-09-01 11:05:36
141.98.9.205 attack
Sep  1 05:10:45 webserver postfix/smtpd\[19324\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 05:11:55 webserver postfix/smtpd\[19324\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 05:13:05 webserver postfix/smtpd\[19223\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 05:14:15 webserver postfix/smtpd\[19223\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 05:15:25 webserver postfix/smtpd\[19223\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-01 11:20:04
81.92.149.60 attackbots
[Aegis] @ 2019-09-01 03:46:04  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-09-01 11:15:15
170.150.155.102 attack
Sep  1 05:40:57 server sshd\[28208\]: Invalid user decker from 170.150.155.102 port 38114
Sep  1 05:40:57 server sshd\[28208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.150.155.102
Sep  1 05:40:59 server sshd\[28208\]: Failed password for invalid user decker from 170.150.155.102 port 38114 ssh2
Sep  1 05:46:01 server sshd\[17306\]: Invalid user olga from 170.150.155.102 port 55222
Sep  1 05:46:01 server sshd\[17306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.150.155.102
2019-09-01 10:59:46
144.217.89.55 attackbotsspam
[ssh] SSH attack
2019-09-01 10:45:24
167.71.2.71 attack
Reported by AbuseIPDB proxy server.
2019-09-01 11:06:28
185.254.122.37 attackspam
Sep  1 03:47:23 h2177944 kernel: \[179119.832601\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.254.122.37 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=33773 PROTO=TCP SPT=44419 DPT=39168 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  1 03:47:23 h2177944 kernel: \[179119.886572\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.254.122.37 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x20 TTL=245 ID=38484 PROTO=TCP SPT=44419 DPT=44562 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  1 04:47:24 h2177944 kernel: \[182719.927766\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.254.122.37 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x20 TTL=245 ID=5525 PROTO=TCP SPT=44419 DPT=48237 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  1 04:47:25 h2177944 kernel: \[182720.789309\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.254.122.37 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x20 TTL=245 ID=37536 PROTO=TCP SPT=44419 DPT=64517 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  1 04:47:25 h2177944 kernel: \[182721.568089\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.254.122.37 DST=85.214.11
2019-09-01 11:21:22
185.52.2.165 attackbots
Automatic report - Banned IP Access
2019-09-01 10:53:47
138.94.189.168 attackbots
Sep  1 02:58:21 MK-Soft-VM6 sshd\[11685\]: Invalid user alfreda from 138.94.189.168 port 59585
Sep  1 02:58:21 MK-Soft-VM6 sshd\[11685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.94.189.168
Sep  1 02:58:23 MK-Soft-VM6 sshd\[11685\]: Failed password for invalid user alfreda from 138.94.189.168 port 59585 ssh2
...
2019-09-01 11:06:45
120.88.185.39 attackspam
$f2bV_matches
2019-09-01 11:09:34
77.172.50.23 attackspambots
Port Scan: TCP/443
2019-09-01 11:22:26

Recently Reported IPs

17.240.217.101 240.89.238.154 3.188.228.197 227.198.156.17
106.81.144.52 29.189.198.79 20.213.92.241 161.113.169.118
16.97.166.129 134.77.180.0 73.23.98.245 231.126.9.34
215.232.82.188 162.95.104.20 81.71.131.209 3.91.167.89
26.61.34.127 74.241.102.186 17.193.50.9 78.99.146.183