Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.142.253.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.142.253.41.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110200 1800 900 604800 86400

;; Query time: 136 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 22:25:38 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 41.253.142.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.253.142.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.248.112.205 attack
Feb  4 19:07:44 auw2 sshd\[27716\]: Invalid user romainville from 104.248.112.205
Feb  4 19:07:44 auw2 sshd\[27716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.112.205
Feb  4 19:07:45 auw2 sshd\[27716\]: Failed password for invalid user romainville from 104.248.112.205 port 53216 ssh2
Feb  4 19:10:54 auw2 sshd\[28114\]: Invalid user default from 104.248.112.205
Feb  4 19:10:54 auw2 sshd\[28114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.112.205
2020-02-05 13:25:38
176.31.102.37 attackspambots
Feb  5 06:20:41 dedicated sshd[22485]: Invalid user roetterer from 176.31.102.37 port 47784
2020-02-05 13:21:16
5.251.142.64 attackspam
Unauthorized connection attempt detected from IP address 5.251.142.64 to port 23 [J]
2020-02-05 10:46:53
42.118.196.49 attack
Unauthorized connection attempt detected from IP address 42.118.196.49 to port 23 [J]
2020-02-05 10:43:08
45.136.108.64 attack
Fail2Ban Ban Triggered
2020-02-05 13:26:36
27.221.97.3 attackbots
Unauthorized connection attempt detected from IP address 27.221.97.3 to port 2220 [J]
2020-02-05 10:45:26
191.7.152.13 attackbots
2020-02-04T23:54:43.012928vostok sshd\[18404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.152.13  user=ftp | Triggered by Fail2Ban at Vostok web server
2020-02-05 13:27:04
46.166.143.114 attack
(From 11bernd11@gmx-topmail.de) $15,000 a month (30mins “worк” lоl): https://links.wtf/kFRQ
2020-02-05 13:33:50
176.9.50.182 attackbotsspam
Autoban   176.9.50.182 AUTH/CONNECT
2020-02-05 13:12:22
31.177.251.28 attack
Unauthorized connection attempt detected from IP address 31.177.251.28 to port 23 [J]
2020-02-05 10:45:10
134.209.125.36 attackbots
xmlrpc attack
2020-02-05 13:23:02
41.221.84.234 attackbots
Unauthorized connection attempt detected from IP address 41.221.84.234 to port 1433 [J]
2020-02-05 10:43:30
45.74.150.144 attackbotsspam
Unauthorized connection attempt detected from IP address 45.74.150.144 to port 5555 [J]
2020-02-05 10:42:51
222.186.175.147 attackspambots
Failed password for root from 222.186.175.147 port 23886 ssh2
Failed password for root from 222.186.175.147 port 23886 ssh2
Failed password for root from 222.186.175.147 port 23886 ssh2
Failed password for root from 222.186.175.147 port 23886 ssh2
2020-02-05 13:24:22
5.251.197.144 attack
Unauthorized connection attempt detected from IP address 5.251.197.144 to port 23 [J]
2020-02-05 10:46:29

Recently Reported IPs

184.63.107.189 164.167.250.204 43.26.183.18 9.9.51.5
167.71.134.135 40.105.135.99 250.43.234.132 153.70.116.199
70.244.126.27 50.170.235.88 214.12.86.183 151.209.92.97
17.132.44.105 25.212.153.211 61.198.200.223 218.38.249.176
209.33.212.172 10.70.180.165 169.201.155.37 214.244.44.189