Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.253.196.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.253.196.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 21:51:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 140.196.253.16.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 16.253.196.140.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
124.253.147.60 attack
23/tcp
[2019-08-23]1pkt
2019-08-24 09:07:08
139.59.45.98 attackspambots
SSH Bruteforce
2019-08-24 09:33:07
200.14.252.129 attackspambots
Brute force RDP, port 3389
2019-08-24 08:52:17
222.220.68.41 attackspambots
23/tcp
[2019-08-23]1pkt
2019-08-24 09:07:29
175.176.88.145 attack
19/8/23@12:13:18: FAIL: Alarm-Intrusion address from=175.176.88.145
...
2019-08-24 08:59:52
197.55.211.50 attack
23/tcp
[2019-08-23]1pkt
2019-08-24 08:55:13
51.77.141.158 attackspambots
"Fail2Ban detected SSH brute force attempt"
2019-08-24 08:54:42
39.48.100.254 attackbotsspam
2019-08-23 17:40:27 unexpected disconnection while reading SMTP command from ([39.48.100.254]) [39.48.100.254]:16741 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-08-23 17:43:33 unexpected disconnection while reading SMTP command from ([39.48.100.254]) [39.48.100.254]:17773 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-08-23 17:44:05 unexpected disconnection while reading SMTP command from ([39.48.100.254]) [39.48.100.254]:17943 I=[10.100.18.22]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.48.100.254
2019-08-24 09:03:46
125.162.69.227 attack
Automatic report - Port Scan Attack
2019-08-24 09:14:20
51.83.74.45 attackspambots
Invalid user rohit from 51.83.74.45 port 45266
2019-08-24 09:18:10
58.87.124.196 attack
Aug 24 01:17:28 mail sshd\[17408\]: Failed password for invalid user 1 from 58.87.124.196 port 44121 ssh2
Aug 24 01:35:39 mail sshd\[17626\]: Invalid user 15 from 58.87.124.196 port 46015
...
2019-08-24 08:53:29
84.54.57.167 attackbots
B: Magento admin pass test (wrong country)
2019-08-24 08:59:15
159.65.245.203 attack
Invalid user www from 159.65.245.203 port 45050
2019-08-24 09:11:17
62.152.60.50 attackbots
Aug 24 01:13:45 hcbbdb sshd\[11116\]: Invalid user asa from 62.152.60.50
Aug 24 01:13:45 hcbbdb sshd\[11116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.152.60.50
Aug 24 01:13:46 hcbbdb sshd\[11116\]: Failed password for invalid user asa from 62.152.60.50 port 54370 ssh2
Aug 24 01:17:51 hcbbdb sshd\[11527\]: Invalid user okilab from 62.152.60.50
Aug 24 01:17:51 hcbbdb sshd\[11527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.152.60.50
2019-08-24 09:28:36
50.117.96.61 attackspam
Aug 23 13:05:41 TORMINT sshd\[30934\]: Invalid user suporte from 50.117.96.61
Aug 23 13:05:42 TORMINT sshd\[30934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.117.96.61
Aug 23 13:05:44 TORMINT sshd\[30934\]: Failed password for invalid user suporte from 50.117.96.61 port 50559 ssh2
...
2019-08-24 09:19:40

Recently Reported IPs

175.158.185.83 231.16.7.105 205.85.98.60 62.186.200.229
74.57.137.189 161.148.164.52 29.149.118.120 241.75.133.96
174.207.159.176 84.48.46.193 101.107.59.77 116.109.2.19
89.213.200.206 193.94.119.181 54.221.84.170 243.29.24.10
218.79.163.44 44.58.79.191 133.190.206.177 191.102.181.134