Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Busan

Region: Busan

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: SK Broadband Co Ltd

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.252.152.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36457
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.252.152.29.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070800 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 09 00:40:55 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 29.152.252.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 29.152.252.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.73.182.123 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-06-20 04:35:49
123.122.161.85 attackspam
2020-06-19T15:04:52.276174afi-git.jinr.ru sshd[32642]: Invalid user hang from 123.122.161.85 port 58250
2020-06-19T15:04:52.279382afi-git.jinr.ru sshd[32642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.122.161.85
2020-06-19T15:04:52.276174afi-git.jinr.ru sshd[32642]: Invalid user hang from 123.122.161.85 port 58250
2020-06-19T15:04:54.198522afi-git.jinr.ru sshd[32642]: Failed password for invalid user hang from 123.122.161.85 port 58250 ssh2
2020-06-19T15:10:05.165411afi-git.jinr.ru sshd[4148]: Invalid user lin from 123.122.161.85 port 41962
...
2020-06-20 04:41:56
218.92.0.252 attackbots
Failed password for invalid user from 218.92.0.252 port 44023 ssh2
2020-06-20 05:02:53
122.51.129.114 attackspambots
$f2bV_matches
2020-06-20 04:37:45
195.192.226.115 attackspambots
firewall-block, port(s): 23/tcp
2020-06-20 04:29:35
180.211.218.62 attackbots
$lgm
2020-06-20 04:57:05
167.71.134.241 attackspambots
Jun 20 06:39:53 localhost sshd[1573518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.134.241  user=root
Jun 20 06:39:55 localhost sshd[1573518]: Failed password for root from 167.71.134.241 port 43694 ssh2
...
2020-06-20 04:51:58
70.45.195.145 attackbots
firewall-block, port(s): 445/tcp
2020-06-20 04:47:23
222.186.42.7 attack
...
2020-06-20 04:42:58
185.156.73.38 attackbotsspam
[H1.VM10] Blocked by UFW
2020-06-20 04:48:32
188.24.147.240 attackspam
Automatic report - Port Scan Attack
2020-06-20 04:41:20
218.92.0.168 attackbotsspam
SSH bruteforce
2020-06-20 04:33:24
218.92.0.253 attack
2020-06-19T23:39:54.531214afi-git.jinr.ru sshd[14230]: Failed password for root from 218.92.0.253 port 3914 ssh2
2020-06-19T23:39:58.484107afi-git.jinr.ru sshd[14230]: Failed password for root from 218.92.0.253 port 3914 ssh2
2020-06-19T23:40:01.318096afi-git.jinr.ru sshd[14230]: Failed password for root from 218.92.0.253 port 3914 ssh2
2020-06-19T23:40:01.318269afi-git.jinr.ru sshd[14230]: error: maximum authentication attempts exceeded for root from 218.92.0.253 port 3914 ssh2 [preauth]
2020-06-19T23:40:01.318285afi-git.jinr.ru sshd[14230]: Disconnecting: Too many authentication failures [preauth]
...
2020-06-20 04:46:31
103.57.123.1 attack
5x Failed Password
2020-06-20 04:54:12
96.9.252.102 attackspambots
Invalid user fcs from 96.9.252.102 port 35140
2020-06-20 04:30:02

Recently Reported IPs

2.54.85.190 167.136.186.77 184.150.86.48 24.75.130.27
111.148.251.101 108.198.246.230 213.174.153.231 194.85.227.13
193.37.253.69 3.0.221.80 8.115.55.15 69.175.54.200
181.112.62.26 17.123.77.88 91.147.2.136 91.185.201.92
150.63.38.200 177.72.1.94 82.148.213.200 185.162.113.184