Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
113.53.42.99 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-02 18:27:26
113.53.42.245 attackspambots
1582174175 - 02/20/2020 05:49:35 Host: 113.53.42.245/113.53.42.245 Port: 445 TCP Blocked
2020-02-20 20:11:10
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.53.42.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.53.42.34.			IN	A

;; AUTHORITY SECTION:
.			277	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 21:17:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
34.42.53.113.in-addr.arpa domain name pointer node-8bm.pool-113-53.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.42.53.113.in-addr.arpa	name = node-8bm.pool-113-53.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.16.238.161 attack
Telnet Server BruteForce Attack
2019-07-31 23:53:18
60.246.0.162 attack
(imapd) Failed IMAP login from 60.246.0.162 (MO/Macao/nz0l162.bb60246.ctm.net): 1 in the last 3600 secs
2019-08-01 00:19:59
128.199.107.252 attackbots
Jul 31 11:03:50 host sshd[3715]: Failed password for invalid user wangzy from 128.199.107.252 port 52446 ssh2
Jul 31 11:09:06 host sshd[5050]: Invalid user tobias from 128.199.107.252
Jul 31 11:09:06 host sshd[5050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.107.252
Jul 31 11:09:09 host sshd[5050]: Failed password for invalid user tobias from 128.199.107.252 port 48498 ssh2
Jul 31 11:14:16 host sshd[6324]: Invalid user pi from 128.199.107.252
Jul 31 11:14:16 host sshd[6324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.107.252

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=128.199.107.252
2019-07-31 23:47:55
201.152.23.168 attack
Unauthorized connection attempt from IP address 201.152.23.168 on Port 445(SMB)
2019-07-31 23:46:13
103.107.17.7 attack
Unauthorized connection attempt from IP address 103.107.17.7 on Port 445(SMB)
2019-07-31 23:55:38
166.111.80.44 attackbots
Jul 31 14:40:00 minden010 sshd[1019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.80.44
Jul 31 14:40:02 minden010 sshd[1019]: Failed password for invalid user tyrell from 166.111.80.44 port 34484 ssh2
Jul 31 14:43:36 minden010 sshd[2294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.80.44
...
2019-08-01 00:08:00
211.252.17.254 attackbots
Invalid user celery from 211.252.17.254 port 53970
2019-08-01 00:44:30
178.191.3.192 attackbots
firewall-block, port(s): 443/tcp
2019-07-31 23:52:16
165.22.217.118 attackspam
Jul 29 11:42:40 dallas01 sshd[25767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.217.118
Jul 29 11:42:42 dallas01 sshd[25766]: Failed password for root from 165.22.217.118 port 47738 ssh2
2019-08-01 00:33:47
213.47.116.8 attackspambots
Invalid user pi from 213.47.116.8 port 47926
2019-08-01 00:44:02
103.48.194.72 attackspambots
Jul 31 16:16:44 v22018076622670303 sshd\[19516\]: Invalid user ross from 103.48.194.72 port 48056
Jul 31 16:16:44 v22018076622670303 sshd\[19516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.194.72
Jul 31 16:16:46 v22018076622670303 sshd\[19516\]: Failed password for invalid user ross from 103.48.194.72 port 48056 ssh2
...
2019-08-01 00:56:54
183.80.151.129 attack
Unauthorized connection attempt from IP address 183.80.151.129 on Port 445(SMB)
2019-08-01 00:06:24
89.248.174.201 attack
31.07.2019 13:41:43 Connection to port 10210 blocked by firewall
2019-08-01 00:27:36
180.182.47.132 attack
ssh failed login
2019-07-31 23:56:09
78.26.172.117 attackbotsspam
firewall-block, port(s): 23/tcp
2019-08-01 00:58:18

Recently Reported IPs

43.129.212.158 2.190.67.72 36.74.41.15 200.95.144.66
91.236.140.138 112.133.252.8 185.82.96.51 45.138.74.131
222.220.55.8 82.205.62.145 103.85.102.72 173.82.2.248
120.238.95.125 95.231.147.21 36.106.166.242 223.88.45.55
112.94.96.168 183.197.56.167 176.101.193.85 186.124.218.175