Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Reserved

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.45.150.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4708
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;253.45.150.142.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080300 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 03 14:43:25 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 142.150.45.253.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 142.150.45.253.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.149.3.102 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-08-18 15:57:21
51.75.64.187 attackbots
SSH invalid-user multiple login attempts
2020-08-18 15:44:28
91.82.85.85 attackspambots
Invalid user jjk from 91.82.85.85 port 36958
2020-08-18 16:09:02
185.235.40.165 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-18T07:22:35Z and 2020-08-18T07:30:11Z
2020-08-18 16:16:36
120.201.2.129 attackbotsspam
Brute-force attempt banned
2020-08-18 15:46:17
60.8.232.210 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-18T05:43:44Z and 2020-08-18T05:54:57Z
2020-08-18 15:48:39
213.183.101.89 attackspam
Aug 18 09:09:53 root sshd[23959]: Invalid user marko from 213.183.101.89
...
2020-08-18 16:03:19
177.85.172.145 attack
Aug 17 21:25:03 mockhub sshd[4171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.85.172.145
Aug 17 21:25:05 mockhub sshd[4171]: Failed password for invalid user rqh from 177.85.172.145 port 34556 ssh2
...
2020-08-18 16:13:49
193.112.4.12 attack
$f2bV_matches
2020-08-18 16:08:20
132.232.59.78 attackbotsspam
Aug 18 07:45:47 cosmoit sshd[9033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.59.78
2020-08-18 15:59:49
52.186.8.68 attackbots
[portscan] Port scan
2020-08-18 16:17:06
36.37.201.133 attack
web-1 [ssh] SSH Attack
2020-08-18 15:50:13
189.254.204.50 attack
Icarus honeypot on github
2020-08-18 16:16:07
175.123.253.220 attack
Invalid user hduser from 175.123.253.220 port 33328
2020-08-18 16:03:44
178.46.214.24 attackbotsspam
Telnet Server BruteForce Attack
2020-08-18 15:36:13

Recently Reported IPs

40.98.141.225 9.95.59.253 155.4.54.76 113.236.49.118
10.93.168.148 95.91.201.123 10.181.218.93 119.109.149.253
192.159.104.243 106.12.176.146 27.158.48.131 178.62.17.167
191.235.91.156 131.221.97.38 205.205.150.52 37.229.245.204
106.87.48.172 104.210.255.12 134.1.90.21 184.181.246.54