Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.42.6.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.42.6.253.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 01:16:06 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 253.6.42.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.6.42.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.89.164.153 attackspam
Failed password for root from 51.89.164.153 port 41262 ssh2
2020-04-30 01:49:25
106.12.155.45 attackbotsspam
Invalid user samir from 106.12.155.45 port 33778
2020-04-30 01:42:11
159.65.158.30 attackspam
2020-04-27 23:14:30 server sshd[66117]: Failed password for invalid user qts from 159.65.158.30 port 34968 ssh2
2020-04-30 01:28:13
139.199.20.202 attack
Apr 29 17:01:02 vpn01 sshd[31494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.20.202
Apr 29 17:01:04 vpn01 sshd[31494]: Failed password for invalid user crs from 139.199.20.202 port 59596 ssh2
...
2020-04-30 01:29:53
111.230.13.11 attackspambots
Failed password for root from 111.230.13.11 port 54490 ssh2
2020-04-30 01:38:28
138.68.59.56 attackspambots
Failed password for root from 138.68.59.56 port 36946 ssh2
2020-04-30 01:30:39
111.230.166.245 attack
Brute-force attempt banned
2020-04-30 01:38:04
111.231.133.72 attackspambots
Failed password for root from 111.231.133.72 port 59456 ssh2
2020-04-30 01:37:33
148.70.68.175 attack
Failed password for root from 148.70.68.175 port 58312 ssh2
2020-04-30 01:29:29
134.209.228.241 attackbotsspam
Failed password for root from 134.209.228.241 port 38680 ssh2
2020-04-30 01:31:27
106.75.130.166 attackbots
Brute-force attempt banned
2020-04-30 01:39:15
106.13.47.66 attack
Failed password for root from 106.13.47.66 port 58720 ssh2
2020-04-30 01:40:22
181.48.114.82 attackbotsspam
Invalid user server from 181.48.114.82 port 51196
2020-04-30 01:59:47
106.12.190.99 attackspambots
Invalid user sr from 106.12.190.99 port 44912
2020-04-30 01:41:32
159.65.13.153 attackbotsspam
Invalid user ubuntu from 159.65.13.153 port 41570
2020-04-30 02:03:52

Recently Reported IPs

138.32.177.236 250.225.228.107 206.204.39.169 123.97.126.233
182.211.168.128 2.35.230.95 44.240.170.241 44.246.41.108
62.165.72.222 215.96.64.188 218.94.232.63 143.35.130.106
166.214.244.130 174.37.167.142 208.16.119.132 96.47.144.144
125.55.79.82 3.234.217.110 61.217.184.145 24.51.130.58