Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.237.242.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.237.242.53.			IN	A

;; AUTHORITY SECTION:
.			200	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 09:17:53 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 53.242.237.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.242.237.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.36.148.218 attackbots
Automatic report - Banned IP Access
2019-08-09 02:36:22
120.52.152.16 attack
08/08/2019-14:06:10.688967 120.52.152.16 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-09 02:10:53
122.3.88.147 attack
Aug  8 15:22:24 ns41 sshd[11020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.3.88.147
2019-08-09 02:49:09
222.186.52.124 attackbotsspam
Aug  8 19:43:13 legacy sshd[15005]: Failed password for root from 222.186.52.124 port 19410 ssh2
Aug  8 19:43:30 legacy sshd[15011]: Failed password for root from 222.186.52.124 port 54465 ssh2
...
2019-08-09 02:15:08
223.71.139.98 attackspambots
Reported by AbuseIPDB proxy server.
2019-08-09 02:34:09
145.102.6.86 attackbots
Port scan on 1 port(s): 53
2019-08-09 02:18:22
106.51.141.20 attack
Aug  8 19:36:02 MK-Soft-Root1 sshd\[23046\]: Invalid user catchall from 106.51.141.20 port 39474
Aug  8 19:36:02 MK-Soft-Root1 sshd\[23046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.141.20
Aug  8 19:36:04 MK-Soft-Root1 sshd\[23046\]: Failed password for invalid user catchall from 106.51.141.20 port 39474 ssh2
...
2019-08-09 01:55:30
110.77.197.141 attackbots
port scan and connect, tcp 23 (telnet)
2019-08-09 02:48:33
95.9.161.248 attack
Automatic report - Port Scan Attack
2019-08-09 02:28:04
203.234.211.246 attack
Aug  8 14:06:31 TORMINT sshd\[18196\]: Invalid user silvia from 203.234.211.246
Aug  8 14:06:31 TORMINT sshd\[18196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.234.211.246
Aug  8 14:06:33 TORMINT sshd\[18196\]: Failed password for invalid user silvia from 203.234.211.246 port 41442 ssh2
...
2019-08-09 02:16:46
42.112.231.200 attackspam
Unauthorized connection attempt from IP address 42.112.231.200 on Port 445(SMB)
2019-08-09 01:58:52
67.205.142.246 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-08-09 02:27:29
67.205.140.232 attack
Detected by Synology server trying to access the inactive 'admin' account
2019-08-09 02:14:42
111.251.173.182 attackbotsspam
:
2019-08-09 01:53:31
185.212.128.192 attackbots
Trojan detected in connection to my VNC
2019-08-09 02:24:14

Recently Reported IPs

84.19.14.0 218.144.26.206 159.69.118.101 84.192.96.179
164.199.37.122 188.163.150.130 166.251.245.117 26.23.77.188
76.174.172.111 2406:5a00:cc7:bd00:48e0:a1a3:89c9:3ef3 116.0.149.171 151.87.59.143
153.169.30.119 111.145.100.26 185.53.226.234 158.181.156.233
86.49.251.95 197.27.251.212 155.136.209.11 58.190.243.0