Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tel Aviv

Region: Tel Aviv

Country: Israel

Internet Service Provider: Partner

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.53.252.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62198
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.53.252.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:59:58 CST 2025
;; MSG SIZE  rcvd: 105
Host info
142.252.53.2.in-addr.arpa domain name pointer 2-53-252-142.orange.net.il.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.252.53.2.in-addr.arpa	name = 2-53-252-142.orange.net.il.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.192.225.191 attackbots
Invalid user admin from 124.192.225.191 port 27711
2020-06-06 01:32:08
41.42.172.94 attackspambots
Invalid user admin from 41.42.172.94 port 54936
2020-06-06 01:51:53
91.121.99.153 attack
Invalid user admin from 91.121.99.153 port 9224
2020-06-06 01:44:17
106.12.13.247 attack
Invalid user 22 from 106.12.13.247 port 58728
2020-06-06 01:42:56
122.226.38.134 attackbots
Invalid user ubnt from 122.226.38.134 port 9277
2020-06-06 01:34:52
106.13.110.74 attackbots
Jun  6 03:18:09 localhost sshd[377796]: Connection closed by 106.13.110.74 port 39742 [preauth]
...
2020-06-06 01:42:34
134.209.37.102 attackbotsspam
Invalid user fake from 134.209.37.102 port 57320
2020-06-06 01:30:53
156.204.141.120 attackbots
Invalid user user1 from 156.204.141.120 port 50845
2020-06-06 01:25:46
52.172.9.182 attackspambots
Invalid user share from 52.172.9.182 port 56498
2020-06-06 01:48:08
34.82.57.112 attackspam
Invalid user pi from 34.82.57.112 port 45534
2020-06-06 01:54:45
14.161.43.154 attackspam
Invalid user admin from 14.161.43.154 port 34683
2020-06-06 01:57:43
47.154.231.119 attackbots
2020-06-05T17:47:25.169257shield sshd\[21182\]: Invalid user pi from 47.154.231.119 port 39999
2020-06-05T17:47:25.247217shield sshd\[21182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.154.231.119
2020-06-05T17:47:25.439871shield sshd\[21184\]: Invalid user pi from 47.154.231.119 port 40000
2020-06-05T17:47:25.519026shield sshd\[21184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.154.231.119
2020-06-05T17:47:27.391925shield sshd\[21182\]: Failed password for invalid user pi from 47.154.231.119 port 39999 ssh2
2020-06-06 01:50:15
178.69.212.25 attackspam
Invalid user admin from 178.69.212.25 port 46343
2020-06-06 01:21:16
113.218.134.19 attackspam
Invalid user pi from 113.218.134.19 port 46290
2020-06-06 01:38:41
95.85.24.147 attack
Jun  5 18:26:48 ajax sshd[4692]: Failed password for root from 95.85.24.147 port 43938 ssh2
2020-06-06 01:43:38

Recently Reported IPs

151.143.194.40 80.44.120.53 14.108.51.56 25.182.16.103
248.65.29.218 251.178.179.135 226.13.18.241 7.87.140.236
64.203.116.92 153.147.211.91 46.246.24.1 80.135.153.238
150.178.37.179 195.153.238.233 122.251.136.121 116.25.123.127
114.49.62.195 7.211.154.246 137.21.172.30 213.167.193.219