Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.202.145.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;253.202.145.145.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 12:35:50 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 145.145.202.253.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.145.202.253.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
151.84.222.52 attackbotsspam
2019-07-22T20:28:50.243303abusebot-3.cloudsearch.cf sshd\[2720\]: Invalid user vaibhav from 151.84.222.52 port 19443
2019-07-23 04:38:46
37.252.190.224 attackspambots
Jul 22 15:40:31 dedicated sshd[7687]: Invalid user hc from 37.252.190.224 port 47212
2019-07-23 04:33:23
104.42.27.250 attackbotsspam
ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound
2019-07-23 04:04:33
165.227.97.108 attack
Triggered by Fail2Ban at Vostok web server
2019-07-23 04:32:55
175.140.181.146 attackbotsspam
Jul 22 17:11:48 ns341937 sshd[30806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.181.146
Jul 22 17:11:50 ns341937 sshd[30806]: Failed password for invalid user andi from 175.140.181.146 port 54080 ssh2
Jul 22 17:24:39 ns341937 sshd[520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.181.146
...
2019-07-23 04:28:14
87.244.54.126 attackspam
Lines containing failures of 87.244.54.126
Jul 22 03:24:35 server-name sshd[27322]: Invalid user pi from 87.244.54.126 port 55152
Jul 22 03:24:35 server-name sshd[27324]: Invalid user pi from 87.244.54.126 port 55164
Jul 22 03:24:35 server-name sshd[27322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.244.54.126 
Jul 22 03:24:35 server-name sshd[27324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.244.54.126 
Jul 22 03:24:38 server-name sshd[27322]: Failed password for invalid user pi from 87.244.54.126 port 55152 ssh2
Jul 22 03:24:38 server-name sshd[27322]: Connection closed by invalid user pi 87.244.54.126 port 55152 [preauth]
Jul 22 03:24:38 server-name sshd[27324]: Failed password for invalid user pi from 87.244.54.126 port 55164 ssh2
Jul 22 03:24:38 server-name sshd[27324]: Connection closed by invalid user pi 87.244.54.126 port 55164 [preauth]


........
-----------------------------------------------
https://ww
2019-07-23 04:25:54
129.150.112.159 attack
2019-07-23T01:30:05.770692enmeeting.mahidol.ac.th sshd\[29441\]: User root from oc-129-150-112-159.compute.oraclecloud.com not allowed because not listed in AllowUsers
2019-07-23T01:30:05.896019enmeeting.mahidol.ac.th sshd\[29441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-150-112-159.compute.oraclecloud.com  user=root
2019-07-23T01:30:08.331298enmeeting.mahidol.ac.th sshd\[29441\]: Failed password for invalid user root from 129.150.112.159 port 13795 ssh2
...
2019-07-23 03:48:57
31.210.65.150 attackbotsspam
Jul 22 22:29:23 ArkNodeAT sshd\[15979\]: Invalid user tams from 31.210.65.150
Jul 22 22:29:23 ArkNodeAT sshd\[15979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.65.150
Jul 22 22:29:25 ArkNodeAT sshd\[15979\]: Failed password for invalid user tams from 31.210.65.150 port 55233 ssh2
2019-07-23 04:30:35
37.59.99.243 attack
Jul 22 15:56:39 SilenceServices sshd[29347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.99.243
Jul 22 15:56:41 SilenceServices sshd[29347]: Failed password for invalid user oracle from 37.59.99.243 port 41887 ssh2
Jul 22 16:02:55 SilenceServices sshd[3457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.99.243
2019-07-23 04:21:38
89.39.115.39 attackspambots
Port scan on 3 port(s): 4022 7781 8085
2019-07-23 04:02:40
14.63.174.149 attackspambots
fraudulent SSH attempt
2019-07-23 04:07:55
142.44.137.62 attackspambots
Jul 22 18:09:31 marvibiene sshd[4099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.137.62  user=root
Jul 22 18:09:34 marvibiene sshd[4099]: Failed password for root from 142.44.137.62 port 60074 ssh2
Jul 22 18:13:44 marvibiene sshd[4167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.137.62  user=root
Jul 22 18:13:46 marvibiene sshd[4167]: Failed password for root from 142.44.137.62 port 54166 ssh2
...
2019-07-23 04:06:46
200.23.235.245 attack
Currently 8 failed/unauthorized logins attempts via SMTP/IMAP whostnameh 7 different usernames and wrong password:
2019-07-22T14:42:08+02:00 x@x
2019-07-20T05:59:03+02:00 x@x
2019-07-16T08:24:19+02:00 x@x
2019-07-14T23:47:47+02:00 x@x
2019-07-13T11:16:44+02:00 x@x
2019-07-11T07:24:54+02:00 x@x
2019-07-11T01:48:43+02:00 x@x
2019-07-10T23:44:44+02:00 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=200.23.235.245
2019-07-23 03:52:36
91.106.193.72 attackbots
Jul 22 19:09:35 lnxded64 sshd[8032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.106.193.72
2019-07-23 03:53:50
106.12.102.180 attack
Jul 22 14:33:23 xb3 sshd[9159]: Failed password for invalid user bad from 106.12.102.180 port 34556 ssh2
Jul 22 14:33:23 xb3 sshd[9159]: Received disconnect from 106.12.102.180: 11: Normal Shutdown, Thank you for playing [preauth]
Jul 22 14:33:33 xb3 sshd[9388]: Failed password for invalid user testdev from 106.12.102.180 port 35376 ssh2
Jul 22 14:33:33 xb3 sshd[9388]: Received disconnect from 106.12.102.180: 11: Normal Shutdown, Thank you for playing [preauth]
Jul 22 14:33:40 xb3 sshd[9484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.102.180  user=r.r
Jul 22 14:33:42 xb3 sshd[9484]: Failed password for r.r from 106.12.102.180 port 36098 ssh2
Jul 22 14:33:42 xb3 sshd[9484]: Received disconnect from 106.12.102.180: 11: Normal Shutdown, Thank you for playing [preauth]
Jul 22 14:33:49 xb3 sshd[9692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.102.180  user=r.r
Jul 22 14:........
-------------------------------
2019-07-23 04:39:36

Recently Reported IPs

168.20.81.164 30.162.21.167 188.116.184.235 29.143.5.225
108.76.36.96 239.228.92.129 120.107.108.10 223.134.101.171
173.144.85.127 23.168.244.81 54.160.69.204 114.62.199.54
55.103.127.123 130.40.212.216 231.66.125.249 41.11.102.239
209.101.246.167 104.200.209.164 204.179.47.216 89.93.109.213