Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.157.38.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.157.38.123.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 01:30:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 123.38.157.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 123.38.157.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.41 attackspam
Jun  1 23:43:17 combo sshd[18419]: Failed password for root from 222.186.180.41 port 53098 ssh2
Jun  1 23:43:20 combo sshd[18419]: Failed password for root from 222.186.180.41 port 53098 ssh2
Jun  1 23:43:23 combo sshd[18419]: Failed password for root from 222.186.180.41 port 53098 ssh2
...
2020-06-02 06:46:29
125.45.125.107 attackbotsspam
Icarus honeypot on github
2020-06-02 07:05:12
87.101.72.81 attackbotsspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-02 06:33:18
39.64.47.73 attackspambots
DATE:2020-06-01 22:17:18, IP:39.64.47.73, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-06-02 07:03:52
139.155.19.245 attackbotsspam
Jun  1 22:15:52 vmi345603 sshd[7539]: Failed password for root from 139.155.19.245 port 37546 ssh2
...
2020-06-02 06:36:46
103.129.223.98 attackspambots
Jun  1 23:06:01 OPSO sshd\[13399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.98  user=root
Jun  1 23:06:02 OPSO sshd\[13399\]: Failed password for root from 103.129.223.98 port 41008 ssh2
Jun  1 23:08:56 OPSO sshd\[14031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.98  user=root
Jun  1 23:08:58 OPSO sshd\[14031\]: Failed password for root from 103.129.223.98 port 58746 ssh2
Jun  1 23:11:55 OPSO sshd\[14886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.98  user=root
2020-06-02 06:31:27
125.74.28.28 attack
2020-06-01T20:06:35.568808randservbullet-proofcloud-66.localdomain sshd[16304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.28.28  user=root
2020-06-01T20:06:37.494189randservbullet-proofcloud-66.localdomain sshd[16304]: Failed password for root from 125.74.28.28 port 59584 ssh2
2020-06-01T20:17:35.559439randservbullet-proofcloud-66.localdomain sshd[16402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.28.28  user=root
2020-06-01T20:17:37.424583randservbullet-proofcloud-66.localdomain sshd[16402]: Failed password for root from 125.74.28.28 port 51324 ssh2
...
2020-06-02 06:51:21
91.250.242.12 attackspam
Automatic report - Banned IP Access
2020-06-02 06:58:46
134.209.97.232 spamattack
This IP From signapur Just Try to hack some open ports.
2020-06-02 06:56:00
140.246.171.180 attackbots
SASL PLAIN auth failed: ruser=...
2020-06-02 06:56:48
34.92.15.122 attackbots
$f2bV_matches
2020-06-02 06:46:05
167.71.209.2 attack
Jun  1 23:06:47 OPSO sshd\[13651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.209.2  user=root
Jun  1 23:06:49 OPSO sshd\[13651\]: Failed password for root from 167.71.209.2 port 36886 ssh2
Jun  1 23:10:33 OPSO sshd\[14620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.209.2  user=root
Jun  1 23:10:36 OPSO sshd\[14620\]: Failed password for root from 167.71.209.2 port 41504 ssh2
Jun  1 23:14:27 OPSO sshd\[15284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.209.2  user=root
2020-06-02 06:54:17
45.55.128.109 attackbots
$f2bV_matches
2020-06-02 07:04:07
183.88.234.235 attack
Dovecot Invalid User Login Attempt.
2020-06-02 06:49:37
89.250.148.154 attackspam
89.250.148.154 (RU/Russia/89x250x148x154.static-business.tmn.ertelecom.ru), 12 distributed sshd attacks on account [root] in the last 3600 secs
2020-06-02 06:28:19

Recently Reported IPs

229.116.183.20 210.60.75.61 153.249.82.163 28.170.229.192
17.66.186.127 13.245.74.195 54.12.173.37 187.214.207.237
142.233.220.244 65.69.186.195 85.55.97.22 44.201.113.199
47.115.136.228 51.197.137.41 85.87.32.133 209.176.154.70
137.91.159.159 156.160.118.10 120.129.35.127 138.245.82.93