Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: China Education and Research Network Center

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.53.53.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38386
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.53.53.138.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri May 10 19:28:35 +08 2019
;; MSG SIZE  rcvd: 116

Host info
Host 138.53.53.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 138.53.53.49.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
14.192.17.145 attackbotsspam
Aug 26 04:16:21 cp sshd[5530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.192.17.145
2019-08-26 10:33:14
202.229.120.90 attackbots
Aug 25 18:42:28 MK-Soft-VM7 sshd\[8769\]: Invalid user oradev from 202.229.120.90 port 41593
Aug 25 18:42:28 MK-Soft-VM7 sshd\[8769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.229.120.90
Aug 25 18:42:30 MK-Soft-VM7 sshd\[8769\]: Failed password for invalid user oradev from 202.229.120.90 port 41593 ssh2
...
2019-08-26 10:20:55
41.230.199.89 attackbots
port scan and connect, tcp 23 (telnet)
2019-08-26 10:26:53
178.93.20.164 attackbotsspam
Aug 25 18:30:21 mxgate1 postfix/postscreen[18951]: CONNECT from [178.93.20.164]:44226 to [176.31.12.44]:25
Aug 25 18:30:21 mxgate1 postfix/dnsblog[18988]: addr 178.93.20.164 listed by domain zen.spamhaus.org as 127.0.0.3
Aug 25 18:30:21 mxgate1 postfix/dnsblog[18988]: addr 178.93.20.164 listed by domain zen.spamhaus.org as 127.0.0.11
Aug 25 18:30:21 mxgate1 postfix/dnsblog[18988]: addr 178.93.20.164 listed by domain zen.spamhaus.org as 127.0.0.4
Aug 25 18:30:21 mxgate1 postfix/dnsblog[18989]: addr 178.93.20.164 listed by domain cbl.abuseat.org as 127.0.0.2
Aug 25 18:30:21 mxgate1 postfix/dnsblog[18990]: addr 178.93.20.164 listed by domain bl.spamcop.net as 127.0.0.2
Aug 25 18:30:21 mxgate1 postfix/dnsblog[18987]: addr 178.93.20.164 listed by domain b.barracudacentral.org as 127.0.0.2
Aug 25 18:30:22 mxgate1 postfix/dnsblog[18986]: addr 178.93.20.164 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Aug 25 18:30:27 mxgate1 postfix/postscreen[18951]: DNSBL rank 6 for [178........
-------------------------------
2019-08-26 10:05:06
217.182.95.16 attack
Invalid user inventory from 217.182.95.16 port 42611
2019-08-26 09:56:34
104.248.177.184 attackbotsspam
Aug 25 21:47:26 plusreed sshd[2419]: Invalid user clickbait from 104.248.177.184
...
2019-08-26 10:16:14
182.70.253.202 attack
Aug 25 10:42:48 php2 sshd\[11446\]: Invalid user talk from 182.70.253.202
Aug 25 10:42:48 php2 sshd\[11446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.253.202
Aug 25 10:42:50 php2 sshd\[11446\]: Failed password for invalid user talk from 182.70.253.202 port 54183 ssh2
Aug 25 10:47:53 php2 sshd\[12235\]: Invalid user mike from 182.70.253.202
Aug 25 10:47:53 php2 sshd\[12235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.253.202
2019-08-26 09:59:08
66.249.75.217 attack
Malicious brute force vulnerability hacking attacks
2019-08-26 10:04:02
200.37.95.43 attackspambots
F2B jail: sshd. Time: 2019-08-26 00:28:28, Reported by: VKReport
2019-08-26 09:57:47
142.93.251.39 attack
Aug 25 23:28:37 mail sshd\[3575\]: Failed password for invalid user marcus from 142.93.251.39 port 39070 ssh2
Aug 25 23:44:16 mail sshd\[3880\]: Invalid user csgo1 from 142.93.251.39 port 54944
...
2019-08-26 10:01:32
188.166.158.33 attackspam
$f2bV_matches
2019-08-26 10:17:10
114.39.147.19 attack
Honeypot attack, port: 23, PTR: 114-39-147-19.dynamic-ip.hinet.net.
2019-08-26 10:19:22
50.208.49.154 attackbots
$f2bV_matches
2019-08-26 10:15:42
119.197.77.52 attack
2019-08-26T08:40:50.155540enmeeting.mahidol.ac.th sshd\[23477\]: Invalid user reward from 119.197.77.52 port 55760
2019-08-26T08:40:50.169638enmeeting.mahidol.ac.th sshd\[23477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.197.77.52
2019-08-26T08:40:51.826814enmeeting.mahidol.ac.th sshd\[23477\]: Failed password for invalid user reward from 119.197.77.52 port 55760 ssh2
...
2019-08-26 10:14:43
222.186.15.101 attackbotsspam
Aug 26 04:07:54 dev0-dcfr-rnet sshd[25683]: Failed password for root from 222.186.15.101 port 47490 ssh2
Aug 26 04:07:56 dev0-dcfr-rnet sshd[25683]: Failed password for root from 222.186.15.101 port 47490 ssh2
Aug 26 04:07:58 dev0-dcfr-rnet sshd[25683]: Failed password for root from 222.186.15.101 port 47490 ssh2
2019-08-26 10:14:12

Recently Reported IPs

37.97.205.59 216.233.33.59 35.252.221.62 146.52.111.201
152.91.16.140 80.170.192.40 125.123.140.76 63.83.159.219
201.36.4.46 118.24.178.224 105.104.200.26 77.211.179.184
135.4.86.152 190.207.84.209 172.236.126.188 211.174.252.221
211.14.88.7 160.87.140.248 185.207.136.33 52.79.166.81