Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.213.248.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23175
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.213.248.189.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 10:47:05 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 189.248.213.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.248.213.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
102.185.4.63 attackbots
Unauthorized connection attempt detected from IP address 102.185.4.63 to port 445
2020-01-01 05:51:56
175.136.227.10 attack
port scan and connect, tcp 8080 (http-proxy)
2020-01-01 05:49:12
54.70.15.216 attackspambots
*Port Scan* detected from 54.70.15.216 (US/United States/ec2-54-70-15-216.us-west-2.compute.amazonaws.com). 4 hits in the last 201 seconds
2020-01-01 05:33:21
111.231.239.143 attackspambots
Automatic report - Banned IP Access
2020-01-01 05:31:25
116.255.149.226 attackbots
Triggered by Fail2Ban at Vostok web server
2020-01-01 05:37:34
116.86.166.93 attackspambots
Dec 31 17:28:29 lnxmysql61 sshd[22511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.86.166.93
Dec 31 17:28:30 lnxmysql61 sshd[22512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.86.166.93
Dec 31 17:28:32 lnxmysql61 sshd[22511]: Failed password for invalid user pi from 116.86.166.93 port 42344 ssh2
2020-01-01 05:13:35
159.138.151.46 attackspambots
badbot
2020-01-01 05:29:22
34.70.203.198 attackbots
Unauthorized connection attempt detected from IP address 34.70.203.198 to port 2375
2020-01-01 05:45:02
193.218.140.93 attackbotsspam
Dec 30 18:42:27 server sshd\[764\]: Invalid user tacobell from 193.218.140.93
Dec 30 18:42:27 server sshd\[764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=amonstark.etelecom.spb.ru 
Dec 30 18:42:30 server sshd\[764\]: Failed password for invalid user tacobell from 193.218.140.93 port 58800 ssh2
Dec 31 17:47:59 server sshd\[21749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=amonstark.etelecom.spb.ru  user=root
Dec 31 17:48:01 server sshd\[21749\]: Failed password for root from 193.218.140.93 port 40142 ssh2
...
2020-01-01 05:52:48
47.96.89.11 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2020-01-01 05:34:42
74.132.2.129 attack
" "
2020-01-01 05:25:05
182.61.34.79 attack
$f2bV_matches
2020-01-01 05:28:17
23.95.242.76 attackspambots
SSH login attempts.
2020-01-01 05:48:27
114.34.224.196 attackspambots
$f2bV_matches
2020-01-01 05:15:43
140.249.35.66 attackspambots
Automatic report - Banned IP Access
2020-01-01 05:35:17

Recently Reported IPs

229.223.40.9 50.38.153.155 155.111.98.26 121.201.111.141
15.24.0.26 53.152.118.206 185.52.220.43 38.145.66.77
82.62.160.64 228.59.241.41 162.182.73.161 207.201.114.130
24.253.90.14 169.41.142.244 180.73.99.71 147.131.92.167
174.232.142.16 115.157.214.159 204.184.112.219 170.36.250.226