Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.53.134.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;59.53.134.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011301 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 09:53:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
252.134.53.59.in-addr.arpa domain name pointer 252.134.53.59.broad.nc.jx.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
252.134.53.59.in-addr.arpa	name = 252.134.53.59.broad.nc.jx.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.88.11.18 attack
[portscan] tcp/1433 [MsSQL]
*(RWIN=8192)(11190859)
2019-11-19 20:36:42
86.35.233.166 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-19 20:14:34
92.54.55.148 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-19 19:55:17
46.99.143.17 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-19 19:56:56
58.69.59.99 attack
[portscan] tcp/23 [TELNET]
*(RWIN=18271)(11190859)
2019-11-19 20:25:09
82.77.16.23 attack
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=11643)(11190859)
2019-11-19 20:05:36
185.200.118.38 attackbots
[portscan] tcp/3389 [MS RDP]
*(RWIN=65535)(11190859)
2019-11-19 20:00:38
187.72.73.10 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=30832)(11190859)
2019-11-19 19:59:41
143.137.179.18 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=14948)(11190859)
2019-11-19 20:02:24
46.12.118.167 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=1596)(11190859)
2019-11-19 20:34:07
177.87.159.147 attack
[portscan] tcp/23 [TELNET]
*(RWIN=52680)(11190859)
2019-11-19 20:01:49
103.99.0.97 attack
[portscan] tcp/22 [SSH]
[scan/connect: 4 time(s)]
in blocklist.de:'listed [ssh]'
*(RWIN=8192)(11190859)
2019-11-19 20:03:20
181.208.85.75 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=13996)(11190859)
2019-11-19 20:18:53
12.27.234.142 attack
Telnet Server BruteForce Attack
2019-11-19 20:07:46
37.49.230.18 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 22 - port: 80 proto: TCP cat: Misc Attack
2019-11-19 19:57:33

Recently Reported IPs

184.77.41.15 116.1.80.88 185.132.80.203 230.7.113.162
107.36.74.131 74.193.142.38 171.168.175.9 8.226.132.222
233.81.223.119 54.144.209.5 56.95.52.236 6.247.38.231
205.200.126.31 129.46.210.196 153.25.16.222 147.138.55.137
224.46.162.35 104.138.250.233 7.218.216.125 232.133.175.30