Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.42.144.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;53.42.144.56.			IN	A

;; AUTHORITY SECTION:
.			243	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072402 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 25 13:00:59 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 56.144.42.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.144.42.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.254.33.234 attackbots
2020-08-28 06:56:12.324054-0500  localhost smtpd[33967]: NOQUEUE: reject: RCPT from unknown[45.254.33.234]: 450 4.7.25 Client host rejected: cannot find your hostname, [45.254.33.234]; from= to= proto=ESMTP helo=<012b202e.womenback.buzz>
2020-08-29 02:49:53
124.156.227.100 attackbots
Invalid user kaushik from 124.156.227.100 port 43574
2020-08-29 02:30:08
37.59.55.14 attackbotsspam
2020-08-28T12:27:48.109507server.mjenks.net sshd[830483]: Invalid user testuser from 37.59.55.14 port 49719
2020-08-28T12:27:48.116704server.mjenks.net sshd[830483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.55.14
2020-08-28T12:27:48.109507server.mjenks.net sshd[830483]: Invalid user testuser from 37.59.55.14 port 49719
2020-08-28T12:27:50.089787server.mjenks.net sshd[830483]: Failed password for invalid user testuser from 37.59.55.14 port 49719 ssh2
2020-08-28T12:31:19.287006server.mjenks.net sshd[830913]: Invalid user das from 37.59.55.14 port 52973
...
2020-08-29 02:42:24
186.128.31.194 attackbotsspam
Unauthorised access (Aug 28) SRC=186.128.31.194 LEN=52 TTL=117 ID=31584 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-29 02:45:14
138.68.178.64 attack
Aug 28 18:16:47 scw-focused-cartwright sshd[10733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.178.64
Aug 28 18:16:49 scw-focused-cartwright sshd[10733]: Failed password for invalid user huawei from 138.68.178.64 port 51162 ssh2
2020-08-29 02:25:01
140.143.1.207 attackspambots
Aug 28 13:46:40 vm0 sshd[9494]: Failed password for root from 140.143.1.207 port 44050 ssh2
Aug 28 14:03:49 vm0 sshd[9771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.1.207
...
2020-08-29 02:17:48
51.178.43.9 attackbots
Aug 28 19:23:03 vpn01 sshd[27480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.43.9
Aug 28 19:23:05 vpn01 sshd[27480]: Failed password for invalid user sekretariat from 51.178.43.9 port 50112 ssh2
...
2020-08-29 02:19:06
212.237.40.95 attackbots
2020-08-28T18:28:06+02:00  exim[2999]: fixed_login authenticator failed for (USER) [212.237.40.95]: 535 Incorrect authentication data (set_id=support@domonkos.co.uk)
2020-08-29 02:46:42
85.221.215.242 attackspam
2020-08-28 11:10:00.241882-0500  localhost smtpd[54431]: NOQUEUE: reject: RCPT from c215-242.icpnet.pl[85.221.215.242]: 554 5.7.1 Service unavailable; Client host [85.221.215.242] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/85.221.215.242; from= to= proto=ESMTP helo=
2020-08-29 02:49:04
189.240.225.205 attackbots
2020-08-28T19:30:42.390074mail.broermann.family sshd[9237]: Invalid user aaaaa from 189.240.225.205 port 37212
2020-08-28T19:30:42.394506mail.broermann.family sshd[9237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.225.205
2020-08-28T19:30:42.390074mail.broermann.family sshd[9237]: Invalid user aaaaa from 189.240.225.205 port 37212
2020-08-28T19:30:43.920991mail.broermann.family sshd[9237]: Failed password for invalid user aaaaa from 189.240.225.205 port 37212 ssh2
2020-08-28T19:34:19.304367mail.broermann.family sshd[9360]: Invalid user cs from 189.240.225.205 port 44342
...
2020-08-29 02:16:45
68.183.90.130 attackbots
Aug 28 18:33:29 ovpn sshd\[16305\]: Invalid user user from 68.183.90.130
Aug 28 18:33:29 ovpn sshd\[16305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.90.130
Aug 28 18:33:32 ovpn sshd\[16305\]: Failed password for invalid user user from 68.183.90.130 port 54418 ssh2
Aug 28 18:42:06 ovpn sshd\[18409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.90.130  user=root
Aug 28 18:42:08 ovpn sshd\[18409\]: Failed password for root from 68.183.90.130 port 60274 ssh2
2020-08-29 02:32:09
123.18.22.167 attack
Unauthorized connection attempt from IP address 123.18.22.167 on Port 445(SMB)
2020-08-29 02:41:55
185.234.219.228 attackbots
abuse-sasl
2020-08-29 02:24:13
14.1.125.140 attackspambots
Postfix attempt blocked due to public blacklist entry
2020-08-29 02:32:30
185.234.216.64 attack
Aug 28 17:06:29 baraca dovecot: auth-worker(830): passwd(demo@lg.united.net.ua,185.234.216.64): unknown user
Aug 28 17:17:36 baraca dovecot: auth-worker(1550): passwd(xerox@lg.united.net.ua,185.234.216.64): unknown user
Aug 28 17:28:10 baraca dovecot: auth-worker(2161): passwd(spam@lg.united.net.ua,185.234.216.64): unknown user
Aug 28 17:38:32 baraca dovecot: auth-worker(2748): passwd(helpdesk@lg.united.net.ua,185.234.216.64): unknown user
Aug 28 18:40:30 baraca dovecot: auth-worker(7128): passwd(noreply@lg.united.net.ua,185.234.216.64): unknown user
Aug 28 18:50:45 baraca dovecot: auth-worker(7788): passwd(copier@lg.united.net.ua,185.234.216.64): unknown user
...
2020-08-29 02:28:56

Recently Reported IPs

215.206.21.147 185.76.168.161 222.254.23.159 159.199.148.112
7.5.224.106 115.91.255.234 179.200.230.157 233.57.110.58
36.93.59.224 134.86.0.110 205.85.37.9 210.47.253.139
182.56.84.233 107.119.47.253 186.78.61.35 52.109.135.178
115.121.190.35 181.137.26.101 48.198.247.184 164.55.116.7