Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.108.135.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.108.135.14.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:16:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 14.135.108.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.135.108.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.153.196.226 attackspambots
REQUESTED PAGE: /.git/config
2020-09-29 12:46:16
62.112.11.81 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-29T02:43:41Z and 2020-09-29T03:14:14Z
2020-09-29 12:45:15
104.24.126.251 attackbotsspam
Is still abetting cohorts in illegally pilfering email addresses and spamming
2020-09-29 12:54:50
182.75.105.187 attackbots
Sep 29 04:25:38 ns3164893 sshd[20084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.105.187
Sep 29 04:25:40 ns3164893 sshd[20084]: Failed password for invalid user 8 from 182.75.105.187 port 13445 ssh2
...
2020-09-29 12:45:47
106.226.226.236 attackspambots
Forbidden directory scan :: 2020/09/28 20:40:49 [error] 978#978: *608863 access forbidden by rule, client: 106.226.226.236, server: [censored_1], request: "GET /knowledge-base/windows-10/solved-lenovo-built-in... HTTP/1.1", host: "www.[censored_1]"
2020-09-29 12:36:19
206.189.41.221 attackbots
[TueSep2902:55:56.5669092020][:error][pid19597:tid47081091880704][client206.189.41.221:64945][client206.189.41.221]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd\\\\\\\\.conf\|boot\\\\\\\\.ini\|web.config\)\\\\\\\\b\|\(\|\^\|\\\\\\\\.\\\\\\\\.\)/etc/\|/\\\\\\\\.\(\?:history\|bash_history\|sh_history\|env\)\$\)"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/10_asl_rules.conf"][line"211"][id"390709"][rev"30"][msg"Atomicorp.comWAFRules:Attempttoaccessprotectedfileremotely"][data"/.env"][severity"CRITICAL"][hostname"136.243.224.50"][uri"/.env"][unique_id"X3KGHOs4W6HPiHytMjoaPwAAAMg"]\,referer:https://www.google.com/[TueSep2902:55:57.7687982020][:error][pid19637:tid47081108690688][client206.189.41.221:65014][client206.189.41.221]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\^0\$"against"REQUEST_HEADERS:Content-Length"required.[file"/etc/apache2/conf.d/
2020-09-29 13:10:30
114.67.80.134 attackbotsspam
11833/tcp 8832/tcp 24755/tcp...
[2020-08-31/09-28]84pkt,34pt.(tcp)
2020-09-29 13:13:07
106.13.8.46 attackspambots
$f2bV_matches
2020-09-29 13:09:09
94.23.179.199 attack
Invalid user toor from 94.23.179.199 port 48097
2020-09-29 13:16:41
192.241.235.159 attack
firewall-block, port(s): 2404/tcp
2020-09-29 13:03:47
91.236.172.95 attackbotsspam
$f2bV_matches
2020-09-29 13:04:45
118.40.139.200 attack
Sep 29 01:51:53  sshd\[19387\]: User root from 118.40.139.200 not allowed because not listed in AllowUsersSep 29 01:51:55  sshd\[19387\]: Failed password for invalid user root from 118.40.139.200 port 53426 ssh2
...
2020-09-29 12:55:40
195.22.148.76 attack
firewall-block, port(s): 44/tcp, 80/tcp, 5060/tcp
2020-09-29 13:02:20
52.83.79.110 attackspam
Brute-force attempt banned
2020-09-29 12:42:46
210.184.2.66 attack
Sep 29 14:29:04 localhost sshd[2289703]: Invalid user ak47 from 210.184.2.66 port 44570
...
2020-09-29 12:51:46

Recently Reported IPs

26.174.226.50 132.12.171.211 55.24.195.193 73.152.50.255
168.22.247.249 55.186.91.31 129.239.93.221 175.48.169.76
249.155.237.80 13.220.60.84 246.52.220.182 56.5.59.252
225.8.167.35 36.92.103.121 222.91.239.62 172.242.123.128
30.88.167.1 44.124.230.24 190.84.182.54 30.5.225.233