Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.165.53.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;4.165.53.242.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122700 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 27 20:10:43 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 242.53.165.4.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 242.53.165.4.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
185.143.223.213 attackbotsspam
Port scan
2019-11-13 01:10:47
111.93.52.182 attackspambots
Nov 12 17:48:55 cavern sshd[23219]: Failed password for root from 111.93.52.182 port 54188 ssh2
2019-11-13 01:02:58
185.209.0.18 attack
Nov 12 17:08:49 h2177944 kernel: \[6450467.777030\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=34557 PROTO=TCP SPT=56942 DPT=4318 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 12 17:09:43 h2177944 kernel: \[6450522.237824\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=6224 PROTO=TCP SPT=56942 DPT=4329 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 12 17:14:06 h2177944 kernel: \[6450784.504438\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=34008 PROTO=TCP SPT=56942 DPT=4335 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 12 17:32:05 h2177944 kernel: \[6451863.096439\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=45321 PROTO=TCP SPT=56942 DPT=4379 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 12 17:42:18 h2177944 kernel: \[6452476.894915\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.18 DST=85.214.117.9 LEN=4
2019-11-13 00:45:07
61.125.131.96 attackspambots
firewall-block, port(s): 1433/tcp
2019-11-13 00:26:37
144.91.86.133 attack
Nov 12 15:40:00 nextcloud sshd\[10107\]: Invalid user test from 144.91.86.133
Nov 12 15:40:00 nextcloud sshd\[10107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.86.133
Nov 12 15:40:02 nextcloud sshd\[10107\]: Failed password for invalid user test from 144.91.86.133 port 34730 ssh2
...
2019-11-13 00:37:41
129.204.25.248 attack
Nov 12 18:00:13 www sshd\[43494\]: Invalid user abys from 129.204.25.248
Nov 12 18:00:13 www sshd\[43494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.25.248
Nov 12 18:00:15 www sshd\[43494\]: Failed password for invalid user abys from 129.204.25.248 port 32868 ssh2
...
2019-11-13 00:40:54
191.242.113.196 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-13 00:56:55
173.230.226.254 attackspam
port 22
2019-11-13 00:42:07
130.162.66.249 attackspambots
Nov 12 09:52:32 ny01 sshd[18696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.66.249
Nov 12 09:52:35 ny01 sshd[18696]: Failed password for invalid user mysql from 130.162.66.249 port 53970 ssh2
Nov 12 09:56:59 ny01 sshd[19774]: Failed password for root from 130.162.66.249 port 15756 ssh2
2019-11-13 01:04:48
106.105.105.42 attack
Honeypot attack, port: 445, PTR: 106.105.105.42.adsl.dynamic.seed.net.tw.
2019-11-13 00:49:58
46.101.88.10 attackbotsspam
Nov 12 17:06:08 pornomens sshd\[17857\]: Invalid user support from 46.101.88.10 port 17993
Nov 12 17:06:08 pornomens sshd\[17857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.88.10
Nov 12 17:06:11 pornomens sshd\[17857\]: Failed password for invalid user support from 46.101.88.10 port 17993 ssh2
...
2019-11-13 00:56:13
123.13.15.114 attackbots
19/11/12@09:42:14: FAIL: IoT-Telnet address from=123.13.15.114
...
2019-11-13 01:08:25
60.23.160.137 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-13 00:31:25
132.232.79.207 attack
Nov 12 17:40:18 MK-Soft-VM4 sshd[25240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.79.207 
Nov 12 17:40:21 MK-Soft-VM4 sshd[25240]: Failed password for invalid user vmuser from 132.232.79.207 port 33640 ssh2
...
2019-11-13 00:54:22
103.52.52.23 attackbots
2019-11-12T16:28:50.405284abusebot-5.cloudsearch.cf sshd\[16200\]: Invalid user alice from 103.52.52.23 port 46362
2019-11-13 00:38:48

Recently Reported IPs

136.233.20.197 210.96.47.245 39.37.163.197 190.61.45.234
111.192.80.246 4.212.235.62 195.170.23.210 140.207.180.41
122.5.99.195 231.73.141.75 180.95.146.165 153.222.157.200
42.115.153.164 133.34.66.154 86.105.9.67 113.16.79.88
14.186.231.81 82.194.49.27 31.73.242.39 5.196.7.133