Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: Telstra

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.168.53.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;101.168.53.242.			IN	A

;; AUTHORITY SECTION:
.			558	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071901 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jul 20 08:25:47 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 242.53.168.101.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.53.168.101.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.247.169.201 attackspam
20/8/24@00:54:22: FAIL: Alarm-Network address from=171.247.169.201
20/8/24@00:54:22: FAIL: Alarm-Network address from=171.247.169.201
...
2020-08-24 14:38:51
117.87.209.243 attackspambots
Automatic report - Port Scan Attack
2020-08-24 14:41:23
219.92.4.201 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-24 14:47:45
139.99.192.189 attack
[2020-08-24 02:08:33] NOTICE[1185] chan_sip.c: Registration from '"322"' failed for '139.99.192.189:23369' - Wrong password
[2020-08-24 02:08:33] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-24T02:08:33.794-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="322",SessionID="0x7f10c4239d98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/139.99.192.189/23369",Challenge="11cf6f0a",ReceivedChallenge="11cf6f0a",ReceivedHash="265c52b28983f18d23133d93ab72aca2"
[2020-08-24 02:10:46] NOTICE[1185] chan_sip.c: Registration from '"323"' failed for '139.99.192.189:33802' - Wrong password
[2020-08-24 02:10:46] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-24T02:10:46.457-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="323",SessionID="0x7f10c405a408",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/139.
...
2020-08-24 14:57:28
185.220.101.213 attack
$f2bV_matches
2020-08-24 14:48:54
141.98.9.156 attack
5x Failed Password
2020-08-24 15:03:28
157.245.211.180 attackbotsspam
frenzy
2020-08-24 15:01:41
217.147.225.148 attack
IP blocked
2020-08-24 15:02:41
45.136.7.142 attackspambots
2020-08-23 22:53:27.408550-0500  localhost smtpd[54954]: NOQUEUE: reject: RCPT from unknown[45.136.7.142]: 450 4.7.25 Client host rejected: cannot find your hostname, [45.136.7.142]; from= to= proto=ESMTP helo=
2020-08-24 14:47:05
182.254.204.253 attackspambots
$f2bV_matches
2020-08-24 14:31:31
49.36.133.134 attackbotsspam
Automatic report - Port Scan Attack
2020-08-24 14:46:33
192.241.236.76 attackspam
Unauthorized connection attempt from IP address 192.241.236.76 on Port 139(NETBIOS)
2020-08-24 15:07:33
218.92.0.206 attack
Aug 24 09:01:49 santamaria sshd\[13212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.206  user=root
Aug 24 09:01:51 santamaria sshd\[13212\]: Failed password for root from 218.92.0.206 port 35782 ssh2
Aug 24 09:04:41 santamaria sshd\[13271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.206  user=root
...
2020-08-24 15:06:19
58.220.87.226 attackspambots
Aug 24 07:54:49 rotator sshd\[19224\]: Invalid user 1 from 58.220.87.226Aug 24 07:54:51 rotator sshd\[19224\]: Failed password for invalid user 1 from 58.220.87.226 port 38086 ssh2Aug 24 07:56:17 rotator sshd\[19986\]: Invalid user salman123 from 58.220.87.226Aug 24 07:56:19 rotator sshd\[19986\]: Failed password for invalid user salman123 from 58.220.87.226 port 48624 ssh2Aug 24 07:57:44 rotator sshd\[20006\]: Invalid user piper from 58.220.87.226Aug 24 07:57:46 rotator sshd\[20006\]: Failed password for invalid user piper from 58.220.87.226 port 59176 ssh2
...
2020-08-24 14:42:27
120.78.237.27 attackspam
Invalid user cot from 120.78.237.27 port 19332
2020-08-24 14:25:45

Recently Reported IPs

195.65.102.57 217.163.105.118 213.172.214.154 217.94.241.69
34.208.248.244 91.97.24.41 5.242.230.16 73.250.231.2
174.136.39.175 133.11.228.120 71.85.33.138 123.8.255.162
75.129.144.18 107.147.146.75 41.217.84.152 1.38.170.230
107.107.254.2 110.102.149.76 5.243.99.68 171.37.85.4