Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.220.212.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52808
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.220.212.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:18:23 CST 2025
;; MSG SIZE  rcvd: 106
Host info
53.212.220.18.in-addr.arpa domain name pointer ec2-18-220-212-53.us-east-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.212.220.18.in-addr.arpa	name = ec2-18-220-212-53.us-east-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.70.149.68 attackbots
Aug 21 08:45:57 alpha postfix/smtps/smtpd[5421]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 21 08:48:11 alpha postfix/smtps/smtpd[5421]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 21 08:50:24 alpha postfix/smtps/smtpd[5421]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-21 14:54:40
36.79.238.215 attack
Aug 21 10:56:20 webhost01 sshd[17389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.79.238.215
Aug 21 10:56:21 webhost01 sshd[17389]: Failed password for invalid user developer from 36.79.238.215 port 50970 ssh2
...
2020-08-21 15:11:16
189.213.12.91 attackspam
Automatic report - Port Scan Attack
2020-08-21 14:52:02
45.65.222.154 attackspambots
Unauthorised access (Aug 21) SRC=45.65.222.154 LEN=52 TOS=0x10 PREC=0x40 TTL=113 ID=31955 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-21 15:30:51
51.254.129.128 attack
2020-08-21T07:55:54.887079vps751288.ovh.net sshd\[18695\]: Invalid user volumio from 51.254.129.128 port 34046
2020-08-21T07:55:54.895402vps751288.ovh.net sshd\[18695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.ip-51-254-129.eu
2020-08-21T07:55:57.550459vps751288.ovh.net sshd\[18695\]: Failed password for invalid user volumio from 51.254.129.128 port 34046 ssh2
2020-08-21T07:59:40.085600vps751288.ovh.net sshd\[18719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.ip-51-254-129.eu  user=root
2020-08-21T07:59:42.096314vps751288.ovh.net sshd\[18719\]: Failed password for root from 51.254.129.128 port 38054 ssh2
2020-08-21 14:57:31
139.59.93.93 attack
Invalid user robert from 139.59.93.93 port 58610
2020-08-21 15:18:14
85.209.0.102 attack
IP blocked
2020-08-21 15:16:09
58.186.51.108 attackspam
20/8/21@00:21:43: FAIL: Alarm-Network address from=58.186.51.108
20/8/21@00:21:44: FAIL: Alarm-Network address from=58.186.51.108
...
2020-08-21 15:15:17
88.153.156.141 attackbots
Aug 21 00:56:43 vps46666688 sshd[28458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.153.156.141
...
2020-08-21 14:56:22
212.64.12.236 attackspambots
Invalid user daxia from 212.64.12.236 port 40926
2020-08-21 15:14:44
218.245.1.169 attackbots
Aug 21 07:46:46 marvibiene sshd[14839]: Failed password for root from 218.245.1.169 port 62825 ssh2
Aug 21 07:57:23 marvibiene sshd[15681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.245.1.169 
Aug 21 07:57:25 marvibiene sshd[15681]: Failed password for invalid user minecraft from 218.245.1.169 port 60392 ssh2
2020-08-21 15:18:33
106.12.52.34 attackspambots
Invalid user apache from 106.12.52.34 port 52652
2020-08-21 15:01:52
209.244.77.241 attack
Aug 20 19:33:39 hanapaa sshd\[12042\]: Invalid user fes from 209.244.77.241
Aug 20 19:33:39 hanapaa sshd\[12042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.244.77.241
Aug 20 19:33:40 hanapaa sshd\[12042\]: Failed password for invalid user fes from 209.244.77.241 port 49514 ssh2
Aug 20 19:36:05 hanapaa sshd\[12241\]: Invalid user giulia from 209.244.77.241
Aug 20 19:36:05 hanapaa sshd\[12241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.244.77.241
2020-08-21 15:28:41
148.70.14.121 attackbotsspam
Invalid user cat from 148.70.14.121 port 60710
2020-08-21 15:23:03
209.141.45.189 attackspambots
Aug 21 08:24:18 ns382633 sshd\[4719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.45.189  user=root
Aug 21 08:24:20 ns382633 sshd\[4719\]: Failed password for root from 209.141.45.189 port 44465 ssh2
Aug 21 08:24:23 ns382633 sshd\[4719\]: Failed password for root from 209.141.45.189 port 44465 ssh2
Aug 21 08:24:25 ns382633 sshd\[4719\]: Failed password for root from 209.141.45.189 port 44465 ssh2
Aug 21 08:24:28 ns382633 sshd\[4719\]: Failed password for root from 209.141.45.189 port 44465 ssh2
2020-08-21 14:57:47

Recently Reported IPs

203.132.53.44 62.76.30.97 207.21.241.255 240.106.76.231
186.108.7.73 59.52.61.154 245.6.226.32 127.25.158.152
212.79.183.5 56.193.120.70 98.148.164.95 56.37.30.43
247.81.90.242 137.161.59.215 124.236.26.129 75.145.24.133
135.126.237.73 189.233.33.57 174.144.199.207 133.40.99.11