Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.253.42.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.253.42.5.			IN	A

;; AUTHORITY SECTION:
.			506	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 19:27:10 CST 2022
;; MSG SIZE  rcvd: 105
Host info
5.42.253.159.in-addr.arpa domain name pointer dns2.3jscellmaster.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.42.253.159.in-addr.arpa	name = dns2.3jscellmaster.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.167.53.18 attackbots
Invalid user tino from 180.167.53.18 port 37180
2020-08-23 16:16:03
36.81.203.211 attack
Aug 23 08:25:20 abendstille sshd\[22767\]: Invalid user stp from 36.81.203.211
Aug 23 08:25:20 abendstille sshd\[22767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.81.203.211
Aug 23 08:25:22 abendstille sshd\[22767\]: Failed password for invalid user stp from 36.81.203.211 port 51328 ssh2
Aug 23 08:30:15 abendstille sshd\[27770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.81.203.211  user=root
Aug 23 08:30:18 abendstille sshd\[27770\]: Failed password for root from 36.81.203.211 port 51908 ssh2
...
2020-08-23 16:07:57
161.35.127.35 attack
Auto Fail2Ban report, multiple SSH login attempts.
2020-08-23 15:53:19
206.189.24.40 attackspambots
$f2bV_matches
2020-08-23 15:47:24
184.178.172.16 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-08-23 15:50:57
37.187.117.187 attackbotsspam
Invalid user benny from 37.187.117.187 port 51206
2020-08-23 16:28:24
104.168.173.80 attack
Invalid user timemachine from 104.168.173.80 port 49896
2020-08-23 16:06:55
212.64.3.40 attackspam
Aug 23 07:20:00 *hidden* sshd[32210]: Invalid user blumberg from 212.64.3.40 port 51140 Aug 23 07:20:00 *hidden* sshd[32210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.3.40 Aug 23 07:20:03 *hidden* sshd[32210]: Failed password for invalid user blumberg from 212.64.3.40 port 51140 ssh2 Aug 23 07:23:39 *hidden* sshd[33179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.3.40 user=root Aug 23 07:23:41 *hidden* sshd[33179]: Failed password for *hidden* from 212.64.3.40 port 59228 ssh2
2020-08-23 16:16:30
5.200.72.182 attack
Fail2Ban Ban Triggered
2020-08-23 15:44:11
176.122.159.131 attack
Invalid user student1 from 176.122.159.131 port 40352
2020-08-23 16:13:28
220.123.241.30 attack
Aug 23 04:09:45 firewall sshd[13009]: Invalid user liangyzh from 220.123.241.30
Aug 23 04:09:48 firewall sshd[13009]: Failed password for invalid user liangyzh from 220.123.241.30 port 32422 ssh2
Aug 23 04:12:52 firewall sshd[13068]: Invalid user rita from 220.123.241.30
...
2020-08-23 16:01:52
130.185.155.34 attackbotsspam
Aug 23 07:28:27 scw-6657dc sshd[12769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.185.155.34
Aug 23 07:28:27 scw-6657dc sshd[12769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.185.155.34
Aug 23 07:28:29 scw-6657dc sshd[12769]: Failed password for invalid user eko from 130.185.155.34 port 36566 ssh2
...
2020-08-23 16:05:25
66.70.173.63 attackspambots
(sshd) Failed SSH login from 66.70.173.63 (US/United States/ip63.ip-66-70-173.net): 5 in the last 3600 secs
2020-08-23 16:07:42
177.55.182.206 attack
port scan and connect, tcp 23 (telnet)
2020-08-23 16:02:42
161.35.200.85 attackbotsspam
Aug 23 07:58:33 jumpserver sshd[11653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.200.85 
Aug 23 07:58:33 jumpserver sshd[11653]: Invalid user fi from 161.35.200.85 port 36970
Aug 23 07:58:36 jumpserver sshd[11653]: Failed password for invalid user fi from 161.35.200.85 port 36970 ssh2
...
2020-08-23 16:03:12

Recently Reported IPs

246.209.56.197 159.255.167.85 159.253.43.94 159.253.40.187
159.253.35.213 159.253.47.238 159.253.38.152 159.253.37.58
159.253.46.184 159.253.42.2 159.253.90.65 159.253.34.158
159.255.168.134 159.255.168.128 159.255.168.126 159.255.168.123
159.255.168.83 159.255.168.148 159.255.25.138 159.255.168.75