Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
197.211.53.124 proxynormal
Want to check device details
2023-09-13 10:44:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.211.53.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.211.53.18.			IN	A

;; AUTHORITY SECTION:
.			444	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:40:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 18.53.211.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.53.211.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.4.139.158 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-02-13 10:14:57
182.61.173.127 attackbotsspam
Feb 13 02:19:29 cp sshd[11752]: Failed password for root from 182.61.173.127 port 56468 ssh2
Feb 13 02:19:29 cp sshd[11752]: Failed password for root from 182.61.173.127 port 56468 ssh2
2020-02-13 10:19:28
217.128.110.231 attack
Invalid user cwg from 217.128.110.231 port 58096
2020-02-13 10:10:33
219.139.130.144 attackbots
Brute force blocker - service: proftpd1 - aantal: 70 - Fri Apr 20 19:10:14 2018
2020-02-13 10:49:16
120.11.245.81 attackbots
Brute force blocker - service: proftpd1 - aantal: 25 - Sat Apr 21 02:10:14 2018
2020-02-13 10:40:57
210.209.89.143 attackspam
Brute force blocker - service: proftpd1 - aantal: 111 - Fri Apr 20 20:05:16 2018
2020-02-13 10:45:53
95.41.162.17 attackspambots
Automatic report - Port Scan Attack
2020-02-13 10:37:16
222.186.30.57 attackspam
Feb 13 03:06:47 h2177944 sshd\[24493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
Feb 13 03:06:50 h2177944 sshd\[24493\]: Failed password for root from 222.186.30.57 port 63140 ssh2
Feb 13 03:06:52 h2177944 sshd\[24493\]: Failed password for root from 222.186.30.57 port 63140 ssh2
Feb 13 03:06:55 h2177944 sshd\[24493\]: Failed password for root from 222.186.30.57 port 63140 ssh2
...
2020-02-13 10:09:08
50.63.196.79 attack
xmlrpc attack
2020-02-13 10:29:31
117.254.82.196 attackspambots
$f2bV_matches
2020-02-13 10:16:25
200.117.185.230 attackbots
Feb 12 20:19:37 plusreed sshd[11859]: Invalid user ts3server from 200.117.185.230
...
2020-02-13 10:14:28
88.84.200.139 attack
Feb 13 02:43:09 MK-Soft-Root2 sshd[6830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.84.200.139 
Feb 13 02:43:10 MK-Soft-Root2 sshd[6830]: Failed password for invalid user Pa$$w0rd from 88.84.200.139 port 45032 ssh2
...
2020-02-13 10:43:10
179.153.38.43 attackspambots
Feb 13 02:18:58 debian-2gb-nbg1-2 kernel: \[3815967.224434\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=179.153.38.43 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=39 ID=41476 PROTO=TCP SPT=21900 DPT=5555 WINDOW=29937 RES=0x00 SYN URGP=0
2020-02-13 10:46:56
58.219.220.220 attack
Brute force blocker - service: proftpd1, proftpd2 - aantal: 109 - Sat Apr 21 02:55:13 2018
2020-02-13 10:37:47
5.142.137.22 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-02-13 10:25:49

Recently Reported IPs

201.191.71.236 176.118.193.94 177.53.70.116 186.148.194.30
124.123.97.118 85.172.92.211 183.143.39.212 79.119.176.112
193.56.29.218 164.92.238.111 182.126.213.32 201.150.188.138
1.233.125.21 62.16.62.45 188.159.131.218 45.153.22.81
179.51.183.6 209.237.154.195 73.181.135.190 1.202.77.126