Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.101.138.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12282
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;253.101.138.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 21:36:23 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 142.138.101.253.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.138.101.253.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.101.103.191 attackspambots
Feb 21 12:36:57 server sshd\[13606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.191  user=root
Feb 21 12:36:59 server sshd\[13606\]: Failed password for root from 46.101.103.191 port 36626 ssh2
Feb 21 12:37:34 server sshd\[13685\]: Invalid user oracle from 46.101.103.191
Feb 21 12:37:34 server sshd\[13685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.191 
Feb 21 12:37:36 server sshd\[13685\]: Failed password for invalid user oracle from 46.101.103.191 port 39984 ssh2
...
2020-02-21 17:55:20
79.185.110.55 attack
firewall-block, port(s): 81/tcp
2020-02-21 17:55:03
61.19.22.217 attackspambots
Feb 21 09:55:09 ArkNodeAT sshd\[11087\]: Invalid user n from 61.19.22.217
Feb 21 09:55:09 ArkNodeAT sshd\[11087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.22.217
Feb 21 09:55:11 ArkNodeAT sshd\[11087\]: Failed password for invalid user n from 61.19.22.217 port 34516 ssh2
2020-02-21 18:04:33
45.248.159.181 attackspam
20/2/21@00:54:15: FAIL: Alarm-Network address from=45.248.159.181
...
2020-02-21 17:59:03
218.92.0.184 attackspambots
2020-02-21T10:51:53.116587ns386461 sshd\[17873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
2020-02-21T10:51:55.050490ns386461 sshd\[17873\]: Failed password for root from 218.92.0.184 port 2674 ssh2
2020-02-21T10:51:58.646829ns386461 sshd\[17873\]: Failed password for root from 218.92.0.184 port 2674 ssh2
2020-02-21T10:52:01.986840ns386461 sshd\[17873\]: Failed password for root from 218.92.0.184 port 2674 ssh2
2020-02-21T10:52:05.542658ns386461 sshd\[17873\]: Failed password for root from 218.92.0.184 port 2674 ssh2
...
2020-02-21 17:58:13
109.98.52.246 attack
DATE:2020-02-21 05:52:15, IP:109.98.52.246, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-02-21 17:46:48
80.23.235.225 attackspambots
Feb 21 09:22:16 web8 sshd\[17664\]: Invalid user HTTP from 80.23.235.225
Feb 21 09:22:16 web8 sshd\[17664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.23.235.225
Feb 21 09:22:18 web8 sshd\[17664\]: Failed password for invalid user HTTP from 80.23.235.225 port 63417 ssh2
Feb 21 09:25:42 web8 sshd\[19412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.23.235.225  user=list
Feb 21 09:25:44 web8 sshd\[19412\]: Failed password for list from 80.23.235.225 port 58001 ssh2
2020-02-21 17:29:01
165.227.15.124 attackspam
WordPress login Brute force / Web App Attack on client site.
2020-02-21 17:42:49
192.254.107.222 attackbotsspam
Automatic report - Port Scan Attack
2020-02-21 18:00:40
83.12.171.68 attackspambots
Feb 21 10:11:31 ift sshd\[10523\]: Invalid user chris from 83.12.171.68Feb 21 10:11:33 ift sshd\[10523\]: Failed password for invalid user chris from 83.12.171.68 port 37568 ssh2Feb 21 10:15:20 ift sshd\[11167\]: Invalid user ubuntu from 83.12.171.68Feb 21 10:15:21 ift sshd\[11167\]: Failed password for invalid user ubuntu from 83.12.171.68 port 6202 ssh2Feb 21 10:19:13 ift sshd\[11573\]: Failed password for www-data from 83.12.171.68 port 2256 ssh2
...
2020-02-21 17:43:09
158.140.178.97 attack
Feb 21 14:23:14 gw1 sshd[29253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.178.97
Feb 21 14:23:16 gw1 sshd[29253]: Failed password for invalid user oracle from 158.140.178.97 port 34686 ssh2
...
2020-02-21 17:38:21
213.184.249.95 attack
Invalid user deploy from 213.184.249.95 port 50728
2020-02-21 17:41:12
84.2.62.48 attackspambots
Invalid user test3 from 84.2.62.48 port 37762
2020-02-21 17:27:39
95.85.9.94 attackspam
Invalid user TFS from 95.85.9.94 port 41135
2020-02-21 17:35:32
106.13.184.174 attackspam
Feb 21 10:58:18 MK-Soft-VM3 sshd[25188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.184.174 
Feb 21 10:58:20 MK-Soft-VM3 sshd[25188]: Failed password for invalid user hadoop from 106.13.184.174 port 39120 ssh2
...
2020-02-21 18:08:42

Recently Reported IPs

186.230.190.166 27.47.100.180 228.29.235.253 175.118.209.100
135.188.211.75 86.38.140.216 187.27.68.26 140.88.219.98
59.193.129.3 16.103.96.124 135.136.208.21 50.162.188.140
144.35.118.218 18.90.210.117 169.36.134.253 56.85.143.218
156.142.80.11 199.137.185.89 180.114.54.201 37.133.239.19