Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Brakpan

Region: Gauteng

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.253.54.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62281
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.253.54.11.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030801 1800 900 604800 86400

;; Query time: 141 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 09 06:41:16 CST 2020
;; MSG SIZE  rcvd: 117
Host info
11.54.253.102.in-addr.arpa domain name pointer 8ta-253-54-11.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.54.253.102.in-addr.arpa	name = 8ta-253-54-11.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.3.214 attackbotsspam
Jun 23 22:18:43 dedicated sshd[27669]: Invalid user willy from 106.13.3.214 port 44906
Jun 23 22:18:46 dedicated sshd[27669]: Failed password for invalid user willy from 106.13.3.214 port 44906 ssh2
Jun 23 22:18:43 dedicated sshd[27669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.3.214
Jun 23 22:18:43 dedicated sshd[27669]: Invalid user willy from 106.13.3.214 port 44906
Jun 23 22:18:46 dedicated sshd[27669]: Failed password for invalid user willy from 106.13.3.214 port 44906 ssh2
2019-06-24 09:51:59
36.111.191.73 attack
Trying ports that it shouldn't be.
2019-06-24 09:59:29
39.38.24.86 attackbots
C1,WP GET /comic/wp-login.php
2019-06-24 09:45:08
197.53.78.202 attackbotsspam
" "
2019-06-24 09:42:54
185.176.27.186 attackbots
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-24 09:57:18
112.235.117.87 attackspambots
Automatic report - Web App Attack
2019-06-24 09:41:14
77.247.110.194 attack
SIP Server BruteForce Attack
2019-06-24 09:50:45
123.188.18.154 attackspam
" "
2019-06-24 10:15:08
157.230.28.16 attackbots
$f2bV_matches
2019-06-24 10:12:37
185.220.101.29 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.29  user=root
Failed password for root from 185.220.101.29 port 35777 ssh2
Failed password for root from 185.220.101.29 port 35777 ssh2
Failed password for root from 185.220.101.29 port 35777 ssh2
Failed password for root from 185.220.101.29 port 35777 ssh2
2019-06-24 09:54:31
84.1.244.52 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-24 09:51:44
189.127.33.80 attack
23.06.2019 21:55:36 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-06-24 09:58:23
89.44.32.18 attackspam
Automatic report - Web App Attack
2019-06-24 09:53:36
185.244.25.247 attack
DATE:2019-06-23_21:54:54, IP:185.244.25.247, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-24 10:07:50
37.6.224.22 attackspam
port scan and connect, tcp 23 (telnet)
2019-06-24 10:17:53

Recently Reported IPs

107.147.173.114 211.22.28.48 183.17.229.167 65.234.139.107
60.251.120.66 35.212.16.64 91.56.231.45 90.131.26.195
137.150.119.14 42.48.5.48 77.42.126.204 49.83.149.160
47.95.247.217 49.83.140.43 188.163.46.125 91.30.28.255
134.175.93.141 231.234.113.201 208.198.98.94 14.162.214.149