Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.157.253.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.157.253.43.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 06:24:29 CST 2025
;; MSG SIZE  rcvd: 107
Host info
43.253.157.193.in-addr.arpa domain name pointer eduroam-193-157-253-43.wlan.uio.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
43.253.157.193.in-addr.arpa	name = eduroam-193-157-253-43.wlan.uio.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.33.200.45 attack
Unauthorized connection attempt detected from IP address 187.33.200.45 to port 80
2020-07-22 15:49:42
194.168.24.9 attack
Unauthorized connection attempt detected from IP address 194.168.24.9 to port 8080
2020-07-22 15:48:13
49.69.194.69 attackbotsspam
Unauthorized connection attempt detected from IP address 49.69.194.69 to port 22
2020-07-22 16:03:33
52.149.180.113 attack
Unauthorized connection attempt detected from IP address 52.149.180.113 to port 23
2020-07-22 15:37:04
217.73.143.72 attackspambots
Unauthorized connection attempt detected from IP address 217.73.143.72 to port 80
2020-07-22 16:10:46
45.179.52.188 attack
Unauthorized connection attempt detected from IP address 45.179.52.188 to port 23
2020-07-22 15:38:34
178.94.112.166 attack
IP 178.94.112.166 attacked honeypot on port: 2323 at 7/22/2020 12:12:39 AM
2020-07-22 15:51:17
122.2.126.255 attackbotsspam
Unauthorized connection attempt detected from IP address 122.2.126.255 to port 445
2020-07-22 16:16:37
37.6.27.188 attackspam
Unauthorized connection attempt detected from IP address 37.6.27.188 to port 23
2020-07-22 15:41:56
195.29.107.17 attackbots
Unauthorized connection attempt detected from IP address 195.29.107.17 to port 23
2020-07-22 15:47:53
5.234.175.58 attack
Unauthorized connection attempt detected from IP address 5.234.175.58 to port 8080
2020-07-22 15:43:53
68.183.33.196 attack
Unauthorized connection attempt detected from IP address 68.183.33.196 to port 8555
2020-07-22 16:00:27
37.57.133.44 attackbots
Unauthorized connection attempt detected from IP address 37.57.133.44 to port 8080
2020-07-22 15:41:31
20.49.2.187 attack
fail2ban/Jul 22 08:14:58 h1962932 sshd[18231]: Invalid user prashant from 20.49.2.187 port 56270
Jul 22 08:14:58 h1962932 sshd[18231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.49.2.187
Jul 22 08:14:58 h1962932 sshd[18231]: Invalid user prashant from 20.49.2.187 port 56270
Jul 22 08:15:00 h1962932 sshd[18231]: Failed password for invalid user prashant from 20.49.2.187 port 56270 ssh2
Jul 22 08:24:27 h1962932 sshd[18773]: Invalid user dell from 20.49.2.187 port 50568
2020-07-22 16:07:43
116.109.158.221 attackbots
Unauthorized connection attempt detected from IP address 116.109.158.221 to port 81
2020-07-22 16:17:45

Recently Reported IPs

144.2.239.90 97.135.159.118 48.250.4.83 117.11.140.73
174.12.98.126 193.22.82.103 32.44.167.144 166.114.153.25
209.26.6.159 239.16.157.98 38.80.214.90 84.235.221.213
185.70.61.36 152.108.146.242 39.89.64.76 175.93.205.239
138.46.207.155 173.138.127.112 75.46.27.248 116.145.75.4