Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.253.204.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17344
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.253.204.219.		IN	A

;; AUTHORITY SECTION:
.			178	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091101 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 12 04:15:34 CST 2020
;; MSG SIZE  rcvd: 119
Host info
219.204.253.102.in-addr.arpa domain name pointer 8ta-253-204-219.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.204.253.102.in-addr.arpa	name = 8ta-253-204-219.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.47.48.36 attackspambots
SSH login attempts.
2020-03-29 14:54:13
89.31.110.68 attackspam
Unauthorized connection attempt detected from IP address 89.31.110.68 to port 23 [T]
2020-03-29 15:01:18
87.166.154.78 attackspambots
Mar 29 07:38:15 srv206 sshd[11459]: Invalid user fnj from 87.166.154.78
...
2020-03-29 15:17:11
180.76.152.18 attackbots
k+ssh-bruteforce
2020-03-29 15:23:38
140.238.153.125 attackspam
Mar 29 08:19:01 jane sshd[31722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.153.125 
Mar 29 08:19:03 jane sshd[31722]: Failed password for invalid user kwi from 140.238.153.125 port 15601 ssh2
...
2020-03-29 15:02:31
193.187.118.237 attackbotsspam
SSH login attempts.
2020-03-29 15:12:39
115.236.100.114 attackbotsspam
Invalid user fxl from 115.236.100.114 port 64173
2020-03-29 15:25:56
162.243.130.183 attackspambots
" "
2020-03-29 15:01:05
41.234.66.22 attack
Unauthorized connection attempt detected from IP address 41.234.66.22 to port 22
2020-03-29 14:51:18
142.93.140.242 attack
Invalid user sysadmin from 142.93.140.242 port 49706
2020-03-29 14:43:42
208.91.109.18 attack
SSH Scan
2020-03-29 14:42:11
118.24.200.40 attack
(sshd) Failed SSH login from 118.24.200.40 (CN/China/-): 5 in the last 3600 secs
2020-03-29 15:20:58
187.115.200.138 attack
SSH login attempts.
2020-03-29 15:11:17
45.95.168.242 attackbots
DATE:2020-03-29 07:09:55, IP:45.95.168.242, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-03-29 15:22:09
106.12.162.201 attack
Mar 29 07:57:29 * sshd[11856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.201
Mar 29 07:57:30 * sshd[11856]: Failed password for invalid user wrj from 106.12.162.201 port 48702 ssh2
2020-03-29 14:53:30

Recently Reported IPs

7.100.191.254 82.32.17.214 102.44.152.167 134.209.103.181
42.193.4.233 120.224.55.8 147.189.130.204 173.27.100.39
227.69.106.176 7.213.20.195 128.199.51.16 181.188.171.41
116.108.187.49 122.51.60.34 103.99.201.99 167.250.43.17
148.163.124.15 112.230.81.221 73.242.42.168 45.248.160.75