Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Charlottetown

Region: Prince Edward Island

Country: Canada

Internet Service Provider: Bell

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.163.204.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.163.204.253.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032602 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 27 06:20:25 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 253.204.163.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.204.163.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.71.64.51 attackspambots
Automatic report - FTP Brute Force
2019-11-08 03:00:02
110.137.178.18 attack
Caught in portsentry honeypot
2019-11-08 02:59:32
149.56.131.73 attack
Automatic report - Banned IP Access
2019-11-08 03:27:40
113.164.244.98 attackbots
2019-11-07T19:14:06.236447abusebot-5.cloudsearch.cf sshd\[22984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.164.244.98  user=root
2019-11-08 03:23:32
66.70.149.101 attack
2019-11-07T16:46:05.217332mail01 postfix/smtpd[13055]: warning: unknown[66.70.149.101]: SASL PLAIN authentication failed:
2019-11-07T16:46:11.488533mail01 postfix/smtpd[13055]: warning: unknown[66.70.149.101]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T16:46:18.121944mail01 postfix/smtpd[27254]: warning: unknown[66.70.149.101]: SASL PLAIN authentication failed:
2019-11-08 03:02:11
120.157.113.202 attackspam
Nov  7 15:44:24 MK-Soft-VM7 sshd[24743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.157.113.202 
Nov  7 15:44:26 MK-Soft-VM7 sshd[24743]: Failed password for invalid user admin from 120.157.113.202 port 34421 ssh2
...
2019-11-08 02:54:04
118.25.92.221 attack
Nov  7 19:56:38 meumeu sshd[29874]: Failed password for root from 118.25.92.221 port 52094 ssh2
Nov  7 20:00:46 meumeu sshd[30598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.92.221 
Nov  7 20:00:48 meumeu sshd[30598]: Failed password for invalid user wwwrun from 118.25.92.221 port 33022 ssh2
...
2019-11-08 03:08:20
118.24.95.31 attack
Nov  7 08:05:17 web1 sshd\[7128\]: Invalid user moon from 118.24.95.31
Nov  7 08:05:17 web1 sshd\[7128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.31
Nov  7 08:05:19 web1 sshd\[7128\]: Failed password for invalid user moon from 118.24.95.31 port 58555 ssh2
Nov  7 08:09:42 web1 sshd\[7551\]: Invalid user hola123 from 118.24.95.31
Nov  7 08:09:42 web1 sshd\[7551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.31
2019-11-08 03:03:36
114.141.50.171 attackspambots
Automatic report - Banned IP Access
2019-11-08 03:09:58
201.49.110.210 attack
Nov  7 19:00:04 game-panel sshd[30024]: Failed password for root from 201.49.110.210 port 40700 ssh2
Nov  7 19:04:23 game-panel sshd[30191]: Failed password for root from 201.49.110.210 port 38524 ssh2
2019-11-08 03:19:05
180.125.252.193 attackspam
Nov  7 15:23:47 mxgate1 postfix/postscreen[538]: CONNECT from [180.125.252.193]:14997 to [176.31.12.44]:25
Nov  7 15:23:47 mxgate1 postfix/dnsblog[1044]: addr 180.125.252.193 listed by domain zen.spamhaus.org as 127.0.0.3
Nov  7 15:23:47 mxgate1 postfix/dnsblog[1044]: addr 180.125.252.193 listed by domain zen.spamhaus.org as 127.0.0.11
Nov  7 15:23:47 mxgate1 postfix/dnsblog[1044]: addr 180.125.252.193 listed by domain zen.spamhaus.org as 127.0.0.4
Nov  7 15:23:47 mxgate1 postfix/dnsblog[1043]: addr 180.125.252.193 listed by domain cbl.abuseat.org as 127.0.0.2
Nov  7 15:23:47 mxgate1 postfix/dnsblog[1045]: addr 180.125.252.193 listed by domain b.barracudacentral.org as 127.0.0.2
Nov  7 15:23:53 mxgate1 postfix/postscreen[538]: DNSBL rank 4 for [180.125.252.193]:14997
Nov x@x
Nov  7 15:23:55 mxgate1 postfix/postscreen[538]: DISCONNECT [180.125.252.193]:14997


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=180.125.252.193
2019-11-08 02:54:57
201.217.155.180 attackbotsspam
Nov  7 19:07:36 icecube sshd[30740]: Invalid user csanak from 201.217.155.180 port 53000
Nov  7 19:07:36 icecube sshd[30740]: Failed password for invalid user csanak from 201.217.155.180 port 53000 ssh2
Nov  7 19:07:36 icecube sshd[30740]: Invalid user csanak from 201.217.155.180 port 53000
Nov  7 19:07:36 icecube sshd[30740]: Failed password for invalid user csanak from 201.217.155.180 port 53000 ssh2
2019-11-08 03:14:29
60.169.115.59 attack
Nov  7 09:27:43 eola postfix/smtpd[18058]: connect from unknown[60.169.115.59]
Nov  7 09:27:45 eola postfix/smtpd[18058]: NOQUEUE: reject: RCPT from unknown[60.169.115.59]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Nov  7 09:27:45 eola postfix/smtpd[18058]: disconnect from unknown[60.169.115.59] ehlo=1 mail=1 rcpt=0/1 quhostname=1 commands=3/4
Nov  7 09:27:46 eola postfix/smtpd[18058]: connect from unknown[60.169.115.59]
Nov  7 09:27:46 eola postfix/smtpd[18058]: lost connection after AUTH from unknown[60.169.115.59]
Nov  7 09:27:46 eola postfix/smtpd[18058]: disconnect from unknown[60.169.115.59] ehlo=1 auth=0/1 commands=1/2
Nov  7 09:27:47 eola postfix/smtpd[18058]: connect from unknown[60.169.115.59]
Nov  7 09:27:49 eola postfix/smtpd[18058]: lost connection after AUTH from unknown[60.169.115.59]
Nov  7 09:27:49 eola postfix/smtpd[18058]: disconnect from unknown[60.169.115.59] ehlo=1 auth=0/1 commands=1/2
Nov  7 09:........
-------------------------------
2019-11-08 03:19:57
223.27.16.120 attackspambots
223.27.16.120 - - [07/Nov/2019:19:09:58 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
223.27.16.120 - - [07/Nov/2019:19:09:59 +0100] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
223.27.16.120 - - [07/Nov/2019:19:10:00 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
223.27.16.120 - - [07/Nov/2019:19:10:01 +0100] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
223.27.16.120 - - [07/Nov/2019:19:10:01 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
223.27.16.120 - - [07/Nov/2019:19:10:03 +0100] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-08 03:11:45
200.163.197.23 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/200.163.197.23/ 
 
 BR - 1H : (290)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN8167 
 
 IP : 200.163.197.23 
 
 CIDR : 200.163.192.0/18 
 
 PREFIX COUNT : 299 
 
 UNIQUE IP COUNT : 4493824 
 
 
 ATTACKS DETECTED ASN8167 :  
  1H - 1 
  3H - 3 
  6H - 4 
 12H - 8 
 24H - 19 
 
 DateTime : 2019-11-07 15:43:54 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-08 03:17:16

Recently Reported IPs

42.16.77.208 51.15.20.139 247.145.0.174 173.159.106.101
5.110.124.249 49.105.170.183 94.37.180.249 83.135.239.142
228.237.227.93 13.196.106.52 20.117.93.170 98.77.149.21
57.160.162.113 141.118.70.49 4.138.177.152 146.232.61.64
53.48.162.145 27.203.188.192 157.163.185.249 162.161.111.59