Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: TELKOMMOBILE

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.253.137.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61100
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.253.137.49.			IN	A

;; AUTHORITY SECTION:
.			1407	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 23:57:09 CST 2019
;; MSG SIZE  rcvd: 118

Host info
49.137.253.102.in-addr.arpa domain name pointer 8ta-253-137-49.telkomadsl.co.za.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
49.137.253.102.in-addr.arpa	name = 8ta-253-137-49.telkomadsl.co.za.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
211.159.159.238 attackbots
3x Failed Password
2019-11-02 06:36:22
106.13.56.45 attackspam
invalid user
2019-11-02 06:16:20
117.119.84.34 attackbots
Nov  1 21:17:51 Ubuntu-1404-trusty-64-minimal sshd\[13403\]: Invalid user jj from 117.119.84.34
Nov  1 21:17:51 Ubuntu-1404-trusty-64-minimal sshd\[13403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34
Nov  1 21:17:52 Ubuntu-1404-trusty-64-minimal sshd\[13403\]: Failed password for invalid user jj from 117.119.84.34 port 42253 ssh2
Nov  1 21:26:43 Ubuntu-1404-trusty-64-minimal sshd\[21277\]: Invalid user jj from 117.119.84.34
Nov  1 21:26:43 Ubuntu-1404-trusty-64-minimal sshd\[21277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34
2019-11-02 06:09:16
200.216.31.148 attackspambots
Connection by 200.216.31.148 on port: 5900 got caught by honeypot at 11/1/2019 10:20:05 PM
2019-11-02 06:26:45
63.240.240.74 attackbotsspam
Nov  1 15:19:55 mockhub sshd[28110]: Failed password for root from 63.240.240.74 port 38085 ssh2
...
2019-11-02 06:24:41
61.219.149.166 attack
445/tcp 445/tcp 445/tcp
[2019-11-01]3pkt
2019-11-02 06:09:01
161.22.148.117 attackbots
namecheap spam
2019-11-02 06:23:36
212.129.145.64 attackspam
ssh failed login
2019-11-02 06:40:01
125.160.115.163 attack
445/tcp
[2019-11-01]1pkt
2019-11-02 06:12:59
171.14.101.183 attack
1433/tcp
[2019-11-01]1pkt
2019-11-02 06:38:42
157.230.239.99 attackbots
Brute force SMTP login attempted.
...
2019-11-02 06:09:40
190.210.42.83 attackspambots
Nov  1 12:17:50 eddieflores sshd\[8673\]: Invalid user beer from 190.210.42.83
Nov  1 12:17:50 eddieflores sshd\[8673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.83
Nov  1 12:17:53 eddieflores sshd\[8673\]: Failed password for invalid user beer from 190.210.42.83 port 60772 ssh2
Nov  1 12:22:33 eddieflores sshd\[9058\]: Invalid user Status@2017 from 190.210.42.83
Nov  1 12:22:33 eddieflores sshd\[9058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.83
2019-11-02 06:25:24
54.235.240.47 attackbots
timhelmke.de 54.235.240.47 \[01/Nov/2019:21:14:01 +0100\] "POST /wp-login.php HTTP/1.1" 200 5593 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
timhelmke.de 54.235.240.47 \[01/Nov/2019:21:14:03 +0100\] "POST /wp-login.php HTTP/1.1" 200 5544 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-02 06:18:30
89.182.103.149 attackbotsspam
Automatic report - Port Scan Attack
2019-11-02 06:12:36
134.209.16.36 attack
Nov  1 22:56:48 server sshd\[10889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.16.36  user=root
Nov  1 22:56:50 server sshd\[10889\]: Failed password for root from 134.209.16.36 port 38278 ssh2
Nov  1 23:10:22 server sshd\[14276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.16.36  user=root
Nov  1 23:10:24 server sshd\[14276\]: Failed password for root from 134.209.16.36 port 42944 ssh2
Nov  1 23:13:51 server sshd\[14843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.16.36  user=root
...
2019-11-02 06:29:04

Recently Reported IPs

194.163.8.122 41.212.55.195 124.194.159.55 91.10.212.244
194.16.174.246 72.178.165.161 157.230.8.125 84.71.54.247
38.72.104.113 124.168.94.211 201.136.91.133 101.51.215.165
82.149.127.184 3.75.254.61 143.104.159.193 176.151.249.238
194.127.43.15 174.134.185.10 3.220.2.192 171.36.214.153