Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.53.149.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.53.149.114.			IN	A

;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:30:17 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 114.149.53.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.149.53.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
172.104.94.253 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-04 14:17:41
49.234.119.42 attackspambots
SSH Invalid Login
2020-10-04 14:28:04
112.85.42.196 attackbotsspam
Oct  4 08:14:27 santamaria sshd\[32529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.196  user=root
Oct  4 08:14:29 santamaria sshd\[32529\]: Failed password for root from 112.85.42.196 port 9498 ssh2
Oct  4 08:14:32 santamaria sshd\[32529\]: Failed password for root from 112.85.42.196 port 9498 ssh2
...
2020-10-04 14:29:36
140.143.193.52 attackspambots
SSH Brute-Force attacks
2020-10-04 13:57:35
36.71.233.133 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-04 13:58:35
220.123.173.97 attack
20648/udp 55467/udp 44502/udp...
[2020-09-16/10-02]6pkt,6pt.(udp)
2020-10-04 14:12:06
74.120.14.24 attackspam
 UDP 74.120.14.24:9680 -> port 1194, len 42
2020-10-04 14:06:35
83.233.231.3 attackspam
Invalid user test2 from 83.233.231.3 port 41618
2020-10-04 14:11:38
218.92.0.176 attack
Failed password for root from 218.92.0.176 port 36420 ssh2
Failed password for root from 218.92.0.176 port 36420 ssh2
Failed password for root from 218.92.0.176 port 36420 ssh2
Failed password for root from 218.92.0.176 port 36420 ssh2
2020-10-04 14:37:12
119.45.200.147 attackspam
Invalid user easy from 119.45.200.147 port 49566
2020-10-04 13:56:21
184.105.139.67 attack
 UDP 184.105.139.67:36749 -> port 161, len 113
2020-10-04 14:14:54
200.146.75.58 attackbotsspam
Oct  4 07:22:08 lnxmail61 sshd[1728]: Failed password for root from 200.146.75.58 port 54932 ssh2
Oct  4 07:22:08 lnxmail61 sshd[1728]: Failed password for root from 200.146.75.58 port 54932 ssh2
Oct  4 07:26:40 lnxmail61 sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.75.58
2020-10-04 14:19:03
212.80.219.131 attackspambots
firewall-block, port(s): 3321/tcp, 3336/tcp, 3340/tcp, 3355/tcp, 3391/tcp
2020-10-04 14:09:51
176.215.78.143 attackbotsspam
SSH login attempts.
2020-10-04 14:37:27
45.55.129.23 attackbots
Brute forced into our server.
2020-10-04 14:04:55

Recently Reported IPs

11.51.6.95 11.56.67.190 11.52.118.227 11.51.122.186
11.50.198.73 11.50.96.2 11.50.169.146 11.51.132.230
11.52.36.243 11.54.162.105 11.52.180.53 11.50.17.58
11.50.22.42 11.53.140.123 11.55.119.80 11.50.12.44
11.50.108.20 11.52.6.34 11.50.147.18 11.53.5.255