Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.113.23.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.113.23.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011500 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 15 14:23:51 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 53.23.113.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.23.113.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.212.147.227 attackspam
Sep 30 00:28:26 sso sshd[19533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.212.147.227
Sep 30 00:28:29 sso sshd[19533]: Failed password for invalid user admin2 from 106.212.147.227 port 55254 ssh2
...
2020-09-30 15:27:29
106.12.15.239 attackspam
Brute-force attempt banned
2020-09-30 15:37:35
193.27.228.156 attackbots
SIP/5060 Probe, BF, Hack -
2020-09-30 15:56:39
45.129.33.47 attackbots
26 packets to ports 1008 4031 4036 5152 6589 6914 7072 7078 8012 8093 8192 8203 8214 9443 10555 11505 33052 36336 37102 37502 39393 39984 50500 54665 56969 56987
2020-09-30 16:15:07
192.241.234.53 attackbotsspam
Auto Detect Rule!
proto TCP (SYN), 192.241.234.53:51506->gjan.info:1433, len 40
2020-09-30 15:33:05
119.187.120.38 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 62
2020-09-30 15:36:01
93.174.89.55 attack
SIP/5060 Probe, BF, Hack -
2020-09-30 16:32:21
66.240.205.34 attack
SIP/5060 Probe, BF, Hack -
2020-09-30 15:47:54
74.120.14.22 attackspambots
firewall-block, port(s): 5684/udp
2020-09-30 16:36:46
45.129.33.81 attackspambots
[MK-Root1] Blocked by UFW
2020-09-30 16:14:49
148.72.168.23 attackspam
 UDP 148.72.168.23:5337 -> port 5060, len 439
2020-09-30 15:34:43
190.73.45.75 attackspam
Brute-force attempt banned
2020-09-30 15:28:44
103.145.13.58 attackspam
 TCP (SYN) 103.145.13.58:46561 -> port 50802, len 44
2020-09-30 15:39:34
120.194.194.86 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-09-30 15:35:29
45.129.33.82 attackbots
 TCP (SYN) 45.129.33.82:49113 -> port 6185, len 44
2020-09-30 16:14:20

Recently Reported IPs

225.53.18.187 37.219.215.187 157.81.146.20 50.98.224.250
78.90.107.230 138.236.28.160 117.239.176.93 31.57.90.23
144.17.112.230 129.50.184.149 186.1.213.203 66.63.232.54
190.77.53.136 175.96.65.17 116.211.135.133 181.141.141.53
246.108.29.179 61.93.58.221 106.98.97.193 82.157.72.24