Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.153.130.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.153.130.142.		IN	A

;; AUTHORITY SECTION:
.			569	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122600 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 26 18:37:47 CST 2019
;; MSG SIZE  rcvd: 119
Host info
142.130.153.213.in-addr.arpa domain name pointer host-213-153-130-142.reverse.superonline.net.
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

Non-authoritative answer:
142.130.153.213.in-addr.arpa	name = host-213-153-130-142.reverse.superonline.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
201.17.24.195 attackspambots
Invalid user zach from 201.17.24.195 port 38204
2019-08-23 18:04:01
122.55.90.45 attackspambots
Aug 23 05:53:45 vps200512 sshd\[22725\]: Invalid user ksh from 122.55.90.45
Aug 23 05:53:45 vps200512 sshd\[22725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.55.90.45
Aug 23 05:53:47 vps200512 sshd\[22725\]: Failed password for invalid user ksh from 122.55.90.45 port 39497 ssh2
Aug 23 05:58:52 vps200512 sshd\[22902\]: Invalid user bot from 122.55.90.45
Aug 23 05:58:52 vps200512 sshd\[22902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.55.90.45
2019-08-23 18:14:04
13.69.126.114 attackbotsspam
Invalid user hlds from 13.69.126.114 port 54938
2019-08-23 17:27:53
62.152.60.50 attack
Invalid user administrator from 62.152.60.50 port 38449
2019-08-23 17:21:17
27.223.89.238 attackspam
Invalid user diesel from 27.223.89.238 port 36294
2019-08-23 17:26:11
101.108.233.82 attackbots
Invalid user admin from 101.108.233.82 port 47096
2019-08-23 17:16:27
125.27.12.20 attackbotsspam
Invalid user nk from 125.27.12.20 port 53926
2019-08-23 18:12:54
140.143.230.161 attackspambots
Invalid user admin from 140.143.230.161 port 11855
2019-08-23 17:11:28
124.156.164.41 attackbotsspam
Aug 23 11:05:44 icinga sshd[6039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.164.41 
Aug 23 11:05:46 icinga sshd[6039]: Failed password for invalid user ubuntu from 124.156.164.41 port 42968 ssh2
Aug 23 11:22:29 icinga sshd[16485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.164.41 
...
2019-08-23 17:42:03
92.86.179.186 attackbots
Aug 23 11:33:57 rpi sshd[11688]: Failed password for root from 92.86.179.186 port 60822 ssh2
Aug 23 11:37:57 rpi sshd[11704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.86.179.186
2019-08-23 17:50:40
54.37.230.141 attackspam
SSHScan
2019-08-23 17:23:54
207.6.1.11 attackspambots
Invalid user www from 207.6.1.11 port 51099
2019-08-23 18:02:41
45.55.142.207 attackspambots
Aug 22 23:17:16 tdfoods sshd\[20795\]: Invalid user tafadzwa from 45.55.142.207
Aug 22 23:17:16 tdfoods sshd\[20795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.142.207
Aug 22 23:17:19 tdfoods sshd\[20795\]: Failed password for invalid user tafadzwa from 45.55.142.207 port 50223 ssh2
Aug 22 23:21:21 tdfoods sshd\[21153\]: Invalid user job from 45.55.142.207
Aug 22 23:21:21 tdfoods sshd\[21153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.142.207
2019-08-23 17:25:33
94.191.46.179 attack
Invalid user web from 94.191.46.179 port 51734
2019-08-23 18:21:39
23.129.64.216 attack
Aug 23 10:50:05 areeb-Workstation sshd\[30949\]: Invalid user james from 23.129.64.216
Aug 23 10:50:05 areeb-Workstation sshd\[30949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.216
Aug 23 10:50:07 areeb-Workstation sshd\[30949\]: Failed password for invalid user james from 23.129.64.216 port 61201 ssh2
...
2019-08-23 17:26:44

Recently Reported IPs

2.185.144.172 123.20.89.199 208.71.226.58 124.156.55.21
220.174.33.172 193.77.80.155 180.190.69.68 120.33.34.97
86.102.6.253 42.117.55.222 124.92.34.223 45.146.200.36
213.113.252.40 176.239.33.82 216.128.79.56 186.162.145.82
213.14.171.152 8.3.127.202 182.71.113.246 117.252.67.147