Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.218.132.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.218.132.157.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:16:54 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 157.132.218.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.132.218.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.160.186.48 attackbotsspam
Unauthorized connection attempt from IP address 113.160.186.48 on Port 445(SMB)
2019-07-22 16:29:17
109.94.69.123 attackspam
[portscan] Port scan
2019-07-22 16:43:08
186.118.161.155 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 02:57:25,537 INFO [amun_request_handler] PortScan Detected on Port: 445 (186.118.161.155)
2019-07-22 16:08:41
170.246.207.38 attackspam
Brute force attempt
2019-07-22 16:05:45
132.255.251.29 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 03:15:38,251 INFO [amun_request_handler] PortScan Detected on Port: 445 (132.255.251.29)
2019-07-22 16:26:18
180.211.164.226 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 02:57:59,022 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.211.164.226)
2019-07-22 16:04:37
159.65.133.212 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.133.212  user=root
Failed password for root from 159.65.133.212 port 46950 ssh2
Invalid user unitek from 159.65.133.212 port 54622
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.133.212
Failed password for invalid user unitek from 159.65.133.212 port 54622 ssh2
2019-07-22 16:11:52
117.102.78.154 attackspam
Unauthorized connection attempt from IP address 117.102.78.154 on Port 445(SMB)
2019-07-22 16:40:32
93.51.214.202 attack
Unauthorized connection attempt from IP address 93.51.214.202 on Port 445(SMB)
2019-07-22 16:45:01
210.14.77.102 attackspambots
Jul 22 08:45:29 debian sshd\[30620\]: Invalid user abc from 210.14.77.102 port 5495
Jul 22 08:45:29 debian sshd\[30620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.77.102
...
2019-07-22 16:02:16
110.139.97.46 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 02:57:19,470 INFO [amun_request_handler] PortScan Detected on Port: 445 (110.139.97.46)
2019-07-22 16:12:20
201.38.219.136 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 12:20:37,716 INFO [shellcode_manager] (201.38.219.136) no match, writing hexdump (ae2e78d9309a8f28c279f4ae23a8ed75 :2459835) - MS17010 (EternalBlue)
2019-07-22 16:28:22
117.254.210.76 attackspam
Unauthorized connection attempt from IP address 117.254.210.76 on Port 445(SMB)
2019-07-22 16:37:53
157.230.91.45 attack
Jul 22 08:47:42 debian sshd\[30639\]: Invalid user mb from 157.230.91.45 port 37564
Jul 22 08:47:42 debian sshd\[30639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45
...
2019-07-22 15:53:49
155.4.32.16 attackspambots
Jul 22 09:45:12 s64-1 sshd[9531]: Failed password for www-data from 155.4.32.16 port 51886 ssh2
Jul 22 09:49:54 s64-1 sshd[9576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.4.32.16
Jul 22 09:49:56 s64-1 sshd[9576]: Failed password for invalid user userftp from 155.4.32.16 port 50660 ssh2
...
2019-07-22 15:54:17

Recently Reported IPs

103.140.157.14 125.93.242.159 48.197.140.131 224.165.139.7
64.226.66.135 142.233.127.77 38.16.241.28 22.168.161.160
67.166.138.25 6.185.99.26 103.198.81.67 175.250.194.63
184.196.76.97 12.159.144.189 143.118.98.103 146.149.68.77
222.25.33.72 157.161.81.233 114.206.17.93 51.217.49.246