Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.2.53.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.2.53.220.			IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 18:21:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
220.53.2.119.in-addr.arpa domain name pointer ipv4-220-53-2.as55666.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.53.2.119.in-addr.arpa	name = ipv4-220-53-2.as55666.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
150.223.2.123 attack
Invalid user g from 150.223.2.123 port 38314
2019-08-23 14:27:24
101.124.6.112 attack
Aug 23 10:14:30 yabzik sshd[25633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.124.6.112
Aug 23 10:14:32 yabzik sshd[25633]: Failed password for invalid user web from 101.124.6.112 port 50070 ssh2
Aug 23 10:19:01 yabzik sshd[27178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.124.6.112
2019-08-23 15:31:14
94.23.70.116 attackspam
Invalid user helen from 94.23.70.116 port 44781
2019-08-23 14:46:00
83.246.93.211 attackbotsspam
Invalid user sai from 83.246.93.211 port 43626
2019-08-23 15:33:49
35.202.27.205 attackspambots
Invalid user info1 from 35.202.27.205 port 55404
2019-08-23 15:41:37
14.215.46.94 attackspam
Aug 23 06:49:47 root sshd[26402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.46.94 
Aug 23 06:49:50 root sshd[26402]: Failed password for invalid user hadoop from 14.215.46.94 port 53430 ssh2
Aug 23 07:11:00 root sshd[26686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.46.94 
...
2019-08-23 14:57:08
139.59.3.151 attack
Invalid user randy from 139.59.3.151 port 56904
2019-08-23 15:23:16
201.47.158.130 attack
*Port Scan* detected from 201.47.158.130 (BR/Brazil/201.47.158.130.static.host.gvt.net.br). 4 hits in the last 295 seconds
2019-08-23 15:03:51
165.22.30.235 attack
$f2bV_matches
2019-08-23 15:15:21
128.199.59.42 attackspambots
Invalid user network2 from 128.199.59.42 port 36662
2019-08-23 14:34:52
139.199.163.95 attackbotsspam
Invalid user bran from 139.199.163.95 port 41200
2019-08-23 14:29:20
106.12.14.254 attackspambots
Invalid user vnptco from 106.12.14.254 port 43380
2019-08-23 14:43:34
1.203.115.140 attackspambots
Invalid user svn from 1.203.115.140 port 38344
2019-08-23 14:59:50
41.196.0.189 attackspambots
Invalid user mc from 41.196.0.189 port 36932
2019-08-23 15:40:33
134.209.158.32 attackbots
Invalid user fake from 134.209.158.32 port 54760
2019-08-23 15:24:29

Recently Reported IPs

116.207.52.217 119.2.53.246 119.2.53.34 119.2.54.167
119.2.54.198 119.2.54.244 119.2.54.37 119.2.54.84
119.2.54.67 116.207.52.252 119.2.54.38 119.2.54.98
119.2.54.204 119.2.64.237 119.2.64.244 119.2.65.121
119.2.65.149 119.2.65.157 119.2.65.213 119.2.65.185