Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dam Dam

Region: West Bengal

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.142.113.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41454
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;202.142.113.53.			IN	A

;; AUTHORITY SECTION:
.			208	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110300 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 18:37:33 CST 2019
;; MSG SIZE  rcvd: 118
Host info
53.113.142.202.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
** server can't find 53.113.142.202.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
204.246.159.170 attackbotsspam
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-12-12 10:01:41
185.153.196.3 attackspambots
Brute force attack stopped by firewall
2019-12-12 10:06:57
138.68.48.118 attackbotsspam
Dec 12 02:30:37 dedicated sshd[2728]: Invalid user kernoops from 138.68.48.118 port 49138
2019-12-12 10:04:04
157.230.55.177 attack
fail2ban honeypot
2019-12-12 09:51:47
43.248.124.87 attack
$f2bV_matches
2019-12-12 10:09:10
186.138.34.56 attackbots
proto=tcp  .  spt=60161  .  dpt=25  .     (Found on   Dark List de Dec 11)     (40)
2019-12-12 10:06:35
218.189.15.187 attackbotsspam
Brute force attack stopped by firewall
2019-12-12 09:49:04
194.228.84.10 attackbots
Brute force attack stopped by firewall
2019-12-12 09:35:34
213.185.163.124 attackbotsspam
Invalid user hg from 213.185.163.124 port 57360
2019-12-12 10:13:48
152.136.44.49 attackbotsspam
Dec 12 00:50:02 MK-Soft-VM3 sshd[10904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.44.49 
Dec 12 00:50:04 MK-Soft-VM3 sshd[10904]: Failed password for invalid user squid from 152.136.44.49 port 49576 ssh2
...
2019-12-12 09:53:15
166.78.71.3 attackbots
Brute force attack stopped by firewall
2019-12-12 09:47:19
41.139.184.66 attack
Brute force attack stopped by firewall
2019-12-12 10:15:32
14.63.194.162 attack
Dec 11 15:46:49 eddieflores sshd\[28537\]: Invalid user tromans from 14.63.194.162
Dec 11 15:46:49 eddieflores sshd\[28537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.194.162
Dec 11 15:46:51 eddieflores sshd\[28537\]: Failed password for invalid user tromans from 14.63.194.162 port 26492 ssh2
Dec 11 15:53:15 eddieflores sshd\[29112\]: Invalid user raissian from 14.63.194.162
Dec 11 15:53:15 eddieflores sshd\[29112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.194.162
2019-12-12 10:03:01
181.41.216.132 attack
Brute force attack stopped by firewall
2019-12-12 09:49:17
181.41.216.143 attackspambots
Brute force attack stopped by firewall
2019-12-12 10:10:06

Recently Reported IPs

123.30.157.175 113.199.101.24 111.15.181.71 36.248.168.111
207.180.225.23 170.95.248.143 61.133.193.230 95.142.6.91
118.253.253.251 209.97.128.119 182.52.134.179 24.70.93.49
120.230.158.96 124.5.203.118 73.243.218.119 65.215.56.67
193.39.221.156 182.133.142.42 5.170.41.152 97.60.110.89