Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: FPT Broadband Service

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
23/tcp 23/tcp 23/tcp...
[2019-08-18]5pkt,1pt.(tcp)
2019-08-18 12:09:44
Comments on same subnet:
IP Type Details Datetime
1.53.145.61 attackspambots
firewall-block, port(s): 23/tcp
2020-08-12 16:45:18
1.53.145.7 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 02:12:05
1.53.145.127 attackspam
Unauthorized connection attempt detected from IP address 1.53.145.127 to port 23 [J]
2020-01-07 02:55:02
1.53.145.186 attackbotsspam
Unauthorized connection attempt detected from IP address 1.53.145.186 to port 23 [J]
2020-01-06 18:59:55
1.53.145.246 attackspambots
scan z
2019-10-30 00:37:47
1.53.145.150 attack
23/tcp
[2019-07-02]1pkt
2019-07-02 20:19:57
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.53.145.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35779
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.53.145.138.			IN	A

;; AUTHORITY SECTION:
.			192	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081701 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 18 12:09:36 CST 2019
;; MSG SIZE  rcvd: 116
Host info
138.145.53.1.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 138.145.53.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
121.100.17.42 attack
3x Failed Password
2020-05-05 05:35:22
149.56.142.47 attackspambots
SSH Invalid Login
2020-05-05 05:56:40
172.94.53.140 attackbots
SSH bruteforce
2020-05-05 05:50:15
167.114.3.105 attackbotsspam
May  4 22:14:16 dev0-dcde-rnet sshd[8853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.3.105
May  4 22:14:18 dev0-dcde-rnet sshd[8853]: Failed password for invalid user kobe from 167.114.3.105 port 55160 ssh2
May  4 22:26:08 dev0-dcde-rnet sshd[9010]: Failed password for root from 167.114.3.105 port 55372 ssh2
2020-05-05 05:49:07
198.20.99.130 attack
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 3100
2020-05-05 05:47:49
188.165.24.200 attack
May  4 22:06:32 vps58358 sshd\[16726\]: Invalid user sou from 188.165.24.200May  4 22:06:34 vps58358 sshd\[16726\]: Failed password for invalid user sou from 188.165.24.200 port 51240 ssh2May  4 22:09:50 vps58358 sshd\[16853\]: Invalid user xda from 188.165.24.200May  4 22:09:52 vps58358 sshd\[16853\]: Failed password for invalid user xda from 188.165.24.200 port 34584 ssh2May  4 22:13:13 vps58358 sshd\[16916\]: Invalid user postgres from 188.165.24.200May  4 22:13:15 vps58358 sshd\[16916\]: Failed password for invalid user postgres from 188.165.24.200 port 46144 ssh2
...
2020-05-05 05:24:47
89.248.168.217 attackspambots
05/04/2020-17:26:46.271285 89.248.168.217 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-05-05 05:31:23
122.160.46.61 attack
May  4 11:07:49 web1 sshd\[12117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.46.61  user=root
May  4 11:07:51 web1 sshd\[12117\]: Failed password for root from 122.160.46.61 port 46528 ssh2
May  4 11:11:39 web1 sshd\[12572\]: Invalid user byteme from 122.160.46.61
May  4 11:11:39 web1 sshd\[12572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.46.61
May  4 11:11:41 web1 sshd\[12572\]: Failed password for invalid user byteme from 122.160.46.61 port 47060 ssh2
2020-05-05 05:32:47
139.155.82.119 attackbots
(sshd) Failed SSH login from 139.155.82.119 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  4 22:23:49 elude sshd[17160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.82.119  user=root
May  4 22:23:51 elude sshd[17160]: Failed password for root from 139.155.82.119 port 52264 ssh2
May  4 22:25:31 elude sshd[17436]: Invalid user qifan from 139.155.82.119 port 41610
May  4 22:25:33 elude sshd[17436]: Failed password for invalid user qifan from 139.155.82.119 port 41610 ssh2
May  4 22:26:04 elude sshd[17527]: Invalid user gabby from 139.155.82.119 port 48822
2020-05-05 05:52:12
66.249.66.83 attackbotsspam
Automatic report - Banned IP Access
2020-05-05 05:55:17
120.29.157.206 attack
May  4 20:26:02 system,error,critical: login failure for user admin from 120.29.157.206 via telnet
May  4 20:26:03 system,error,critical: login failure for user ubnt from 120.29.157.206 via telnet
May  4 20:26:04 system,error,critical: login failure for user root from 120.29.157.206 via telnet
May  4 20:26:06 system,error,critical: login failure for user root from 120.29.157.206 via telnet
May  4 20:26:07 system,error,critical: login failure for user root from 120.29.157.206 via telnet
May  4 20:26:08 system,error,critical: login failure for user service from 120.29.157.206 via telnet
May  4 20:26:09 system,error,critical: login failure for user administrator from 120.29.157.206 via telnet
May  4 20:26:10 system,error,critical: login failure for user root from 120.29.157.206 via telnet
May  4 20:26:11 system,error,critical: login failure for user root from 120.29.157.206 via telnet
May  4 20:26:12 system,error,critical: login failure for user admin from 120.29.157.206 via telnet
2020-05-05 05:45:39
167.114.114.193 attackspambots
Bruteforce detected by fail2ban
2020-05-05 05:29:59
220.67.128.185 attackspambots
SSH Login Bruteforce
2020-05-05 05:35:56
206.189.164.136 attackspam
SSH Invalid Login
2020-05-05 05:50:52
34.80.176.16 attackbots
Fail2Ban
2020-05-05 05:30:12

Recently Reported IPs

42.179.74.31 111.181.140.70 187.10.126.181 182.61.13.142
45.160.26.15 78.188.44.78 191.53.221.191 165.22.111.229
120.229.20.36 190.111.3.235 191.253.47.240 181.127.10.132
164.68.112.133 85.184.224.149 66.67.9.217 31.168.177.37
58.250.174.75 94.198.0.27 221.127.71.230 152.112.254.144