Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.159.11.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;253.159.11.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 13:41:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 18.11.159.253.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.11.159.253.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.146.209.68 attack
Invalid user butter from 183.146.209.68 port 56746
2019-07-05 13:43:51
103.243.252.244 attackspambots
SSH Bruteforce Attack
2019-07-05 14:10:23
144.76.98.234 attackbots
(sshd) Failed SSH login from 144.76.98.234 (static.234.98.76.144.clients.your-server.de): 5 in the last 3600 secs
2019-07-05 13:55:59
91.121.179.17 attackspambots
Invalid user jsserver from 91.121.179.17 port 59360
2019-07-05 14:17:04
165.227.151.59 attackbots
Jul  5 05:13:39 localhost sshd\[9985\]: Invalid user to from 165.227.151.59 port 41180
Jul  5 05:13:39 localhost sshd\[9985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.151.59
Jul  5 05:13:41 localhost sshd\[9985\]: Failed password for invalid user to from 165.227.151.59 port 41180 ssh2
...
2019-07-05 14:08:38
197.50.45.114 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 15:21:30,722 INFO [shellcode_manager] (197.50.45.114) no match, writing hexdump (cfb324d8f927273a627f62285042ab8a :2124231) - MS17010 (EternalBlue)
2019-07-05 14:20:50
190.242.25.147 attackspambots
2019-07-05 00:21:24 unexpected disconnection while reading SMTP command from ([190.242.25.147]) [190.242.25.147]:63735 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-07-05 00:21:42 unexpected disconnection while reading SMTP command from ([190.242.25.147]) [190.242.25.147]:14562 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-07-05 00:21:48 unexpected disconnection while reading SMTP command from ([190.242.25.147]) [190.242.25.147]:8910 I=[10.100.18.23]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.242.25.147
2019-07-05 14:12:08
138.68.186.24 attackspambots
Jul  5 08:10:23 [munged] sshd[17332]: Invalid user koln from 138.68.186.24 port 52366
Jul  5 08:10:23 [munged] sshd[17332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.186.24
2019-07-05 14:22:38
94.11.104.148 attackbotsspam
Attempted to connect 2 times to port 23 TCP
2019-07-05 13:59:14
42.112.185.185 attackspambots
2019-07-05 00:23:18 unexpected disconnection while reading SMTP command from ([42.112.185.185]) [42.112.185.185]:61119 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-05 00:23:57 unexpected disconnection while reading SMTP command from ([42.112.185.185]) [42.112.185.185]:56816 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-05 00:24:56 unexpected disconnection while reading SMTP command from ([42.112.185.185]) [42.112.185.185]:35979 I=[10.100.18.25]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=42.112.185.185
2019-07-05 14:24:25
125.185.220.13 attackbotsspam
Automated report - ssh fail2ban:
Jul 5 03:07:58 authentication failure 
Jul 5 03:08:00 wrong password, user=ts3server, port=59494, ssh2
Jul 5 03:40:10 authentication failure
2019-07-05 14:08:56
218.148.117.203 attackbots
DATE:2019-07-05_00:45:37, IP:218.148.117.203, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-05 13:48:21
69.197.186.242 attack
19/7/4@22:23:47: FAIL: Alarm-Intrusion address from=69.197.186.242
...
2019-07-05 14:05:16
104.236.186.24 attackspam
Jul  5 06:01:50 *** sshd[7265]: Invalid user jamila from 104.236.186.24
2019-07-05 14:04:53
177.99.217.233 attackspam
Automatic report - Web App Attack
2019-07-05 14:06:37

Recently Reported IPs

124.83.176.39 197.31.60.5 4.85.129.43 44.131.233.51
123.106.214.136 214.211.236.238 199.245.247.53 53.21.89.144
178.230.60.180 95.107.144.57 77.217.93.83 167.76.175.48
79.195.170.121 191.34.217.196 152.212.168.85 135.211.150.246
152.100.59.230 229.142.106.178 25.155.135.88 132.70.66.93