Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
198.18.53.53 spambotsattackproxynormal
http://www.miibeian.gov.cn/
2023-12-12 12:32:33
198.18.53.190 botsattackproxy
Se me abren y cierran las app un desastre
2022-07-05 13:28:18
198.18.53.53 spambotsattackproxynormal
tcp://198.18.53.53:853
198.18.53.53:853
2020-10-31 07:57:24
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       198.18.0.0 - 198.19.255.255
CIDR:           198.18.0.0/15
NetName:        SPECIAL-IPV4-BENCHMARK-TESTING-IANA-RESERVED
NetHandle:      NET-198-18-0-0-1
Parent:         NET198 (NET-198-0-0-0-0)
NetType:        IANA Special Use
OriginAS:       
Organization:   Internet Assigned Numbers Authority (IANA)
RegDate:        1992-11-23
Updated:        2024-05-24
Comment:        Addresses starting with "198.18." or "198.19." are set aside for use in isolated laboratory networks used for benchmarking and performance testing.  They should never appear on the Internet and if you see Internet traffic using these addresses, they are being used without permission.
Comment:        
Comment:        This assignment was made by the IETF, the organization that develops Internet protocols, in RFC 2544, which can be found at:
Comment:        http://datatracker.ietf.org/doc/rfc2544
Ref:            https://rdap.arin.net/registry/ip/198.18.0.0



OrgName:        Internet Assigned Numbers Authority
OrgId:          IANA
Address:        12025 Waterfront Drive
Address:        Suite 300
City:           Los Angeles
StateProv:      CA
PostalCode:     90292
Country:        US
RegDate:        
Updated:        2024-05-24
Ref:            https://rdap.arin.net/registry/entity/IANA


OrgTechHandle: IANA-IP-ARIN
OrgTechName:   ICANN
OrgTechPhone:  +1-310-301-5820 
OrgTechEmail:  abuse@iana.org
OrgTechRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN

OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName:   ICANN
OrgAbusePhone:  +1-310-301-5820 
OrgAbuseEmail:  abuse@iana.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.18.53.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52898
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.18.53.120.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 19:06:51 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 120.53.18.198.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.53.18.198.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.114.115.22 attackspam
Nov  9 03:51:25 odroid64 sshd\[9170\]: User root from 167.114.115.22 not allowed because not listed in AllowUsers
Nov  9 03:51:25 odroid64 sshd\[9170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.115.22  user=root
...
2020-03-06 00:06:10
177.72.223.44 attackspam
Automatic report - Port Scan Attack
2020-03-05 23:53:15
119.1.50.162 attackbotsspam
6881/udp
[2020-03-05]1pkt
2020-03-06 00:25:21
167.114.113.141 attack
Jan 13 12:43:52 odroid64 sshd\[3939\]: User root from 167.114.113.141 not allowed because not listed in AllowUsers
Jan 13 12:43:52 odroid64 sshd\[3939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.113.141  user=root
Feb 22 01:01:02 odroid64 sshd\[20903\]: Invalid user test2 from 167.114.113.141
Feb 22 01:01:02 odroid64 sshd\[20903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.113.141
...
2020-03-06 00:11:41
167.114.103.140 attackbotsspam
Jan 31 06:49:37 odroid64 sshd\[7379\]: Invalid user viveka from 167.114.103.140
Jan 31 06:49:37 odroid64 sshd\[7379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.103.140
...
2020-03-06 00:13:01
125.214.48.187 attack
9530/tcp
[2020-03-05]1pkt
2020-03-05 23:48:17
39.33.165.211 attackbots
445/tcp
[2020-03-05]1pkt
2020-03-05 23:47:03
185.209.0.32 attackspam
03/05/2020-10:30:09.383237 185.209.0.32 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-05 23:54:22
166.145.142.208 attack
Jan 26 09:42:16 odroid64 sshd\[21706\]: User root from 166.145.142.208 not allowed because not listed in AllowUsers
Jan 26 09:42:16 odroid64 sshd\[21706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.145.142.208  user=root
...
2020-03-06 00:14:23
167.114.98.229 attackbotsspam
Jan 18 18:18:41 odroid64 sshd\[23328\]: Invalid user ubnt from 167.114.98.229
Jan 18 18:18:41 odroid64 sshd\[23328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229
...
2020-03-05 23:42:42
51.68.230.54 attack
Mar  5 16:53:04 lnxweb61 sshd[6502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.230.54
Mar  5 16:53:07 lnxweb61 sshd[6502]: Failed password for invalid user ubuntu from 51.68.230.54 port 38022 ssh2
Mar  5 16:56:37 lnxweb61 sshd[9829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.230.54
2020-03-06 00:07:23
79.1.210.60 attackbotsspam
57910/udp
[2020-03-05]1pkt
2020-03-06 00:01:56
165.231.253.194 attackspam
Jan 10 19:47:06 odroid64 sshd\[10367\]: User root from 165.231.253.194 not allowed because not listed in AllowUsers
Jan 10 19:47:06 odroid64 sshd\[10367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.231.253.194  user=root
...
2020-03-06 00:17:41
93.84.136.160 attack
suspicious action Thu, 05 Mar 2020 10:34:31 -0300
2020-03-05 23:56:05
218.92.0.184 attack
Mar  5 16:47:36 MK-Soft-VM5 sshd[6187]: Failed password for root from 218.92.0.184 port 46869 ssh2
Mar  5 16:47:41 MK-Soft-VM5 sshd[6187]: Failed password for root from 218.92.0.184 port 46869 ssh2
...
2020-03-05 23:49:32

Recently Reported IPs

2606:4700:10::6814:7981 195.21.218.205 195.178.110.133 66.132.195.38
70.127.103.1 121.230.89.120 2606:4700:10::6816:710 2606:4700:10::ac43:2923
2606:4700:10::6814:6259 2606:4700:10::6814:7487 2606:4700:10::6816:651 2606:4700:10::6816:1189
204.76.203.26 142.93.243.136 3.93.98.99 98.191.176.1
88.33.201.238 81.52.36.203 200.36.3.0 213.13.245.98