Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.252.140.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.252.140.129.		IN	A

;; AUTHORITY SECTION:
.			274	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 21 20:15:10 CST 2023
;; MSG SIZE  rcvd: 108
Host info
129.140.252.102.in-addr.arpa domain name pointer 8ta-252-140-129.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.140.252.102.in-addr.arpa	name = 8ta-252-140-129.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.238.73.216 attack
$f2bV_matches
2020-04-20 07:33:01
171.6.214.106 attackbotsspam
Autoban   171.6.214.106 AUTH/CONNECT
2020-04-20 07:49:19
218.78.92.29 attackbots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-20 07:30:10
128.199.118.27 attack
Apr 20 01:12:59 host sshd[27935]: Invalid user lx from 128.199.118.27 port 34030
...
2020-04-20 07:52:34
187.38.188.48 attack
Apr 20 01:27:51 mout sshd[23144]: Invalid user sv from 187.38.188.48 port 35262
2020-04-20 07:50:18
175.24.107.214 attackspam
Apr 19 23:13:17 hosting sshd[24339]: Invalid user ubuntu from 175.24.107.214 port 55954
...
2020-04-20 07:29:15
88.88.112.98 attackspam
Invalid user ge from 88.88.112.98 port 55198
2020-04-20 07:48:23
142.93.195.15 attack
Apr 20 02:17:20 Enigma sshd[10728]: Invalid user vh from 142.93.195.15 port 33760
Apr 20 02:17:20 Enigma sshd[10728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.195.15
Apr 20 02:17:20 Enigma sshd[10728]: Invalid user vh from 142.93.195.15 port 33760
Apr 20 02:17:22 Enigma sshd[10728]: Failed password for invalid user vh from 142.93.195.15 port 33760 ssh2
Apr 20 02:21:22 Enigma sshd[11256]: Invalid user ubuntu from 142.93.195.15 port 52286
2020-04-20 07:41:53
46.161.53.51 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-20 07:38:00
68.183.73.45 attack
2020-04-19T17:33:42.042283linuxbox-skyline sshd[259577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.73.45  user=root
2020-04-19T17:33:44.059947linuxbox-skyline sshd[259577]: Failed password for root from 68.183.73.45 port 60592 ssh2
...
2020-04-20 07:40:38
222.186.30.167 attack
19.04.2020 23:23:33 SSH access blocked by firewall
2020-04-20 07:35:06
116.196.94.211 attackbotsspam
SSH Brute-Force Attack
2020-04-20 07:49:52
189.152.155.22 attackbotsspam
Apr 19 20:57:14 ubuntu sshd[94827]: reverse mapping checking getaddrinfo for dsl-189-152-155-22-dyn.prod-infinitum.com.mx [189.152.155.22] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr 19 20:57:14 ubuntu sshd[94827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.152.155.22  user=root
Apr 19 20:57:16 ubuntu sshd[94827]: Failed password for root from 189.152.155.22 port 52190 ssh2
Apr 19 20:57:16 ubuntu sshd[94827]: Connection closed by 189.152.155.22 [preauth]
2020-04-20 07:32:36
45.136.108.85 attackspam
...
2020-04-20 07:56:10
96.27.249.5 attackspam
Apr 19 19:53:48 ws22vmsma01 sshd[153362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.27.249.5
Apr 19 19:53:50 ws22vmsma01 sshd[153362]: Failed password for invalid user admin from 96.27.249.5 port 52386 ssh2
...
2020-04-20 07:55:32

Recently Reported IPs

102.251.229.175 102.251.75.220 102.251.30.34 102.252.134.17
102.251.37.180 102.251.214.236 102.251.46.9 102.251.192.242
102.251.224.217 102.251.203.36 102.251.184.215 102.251.90.133
102.251.33.206 102.252.195.123 102.252.213.232 102.251.162.241
102.251.156.172 102.251.200.117 102.251.40.108 102.251.74.156