Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: Telkom-Internet

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.252.235.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56808
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.252.235.78.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 09:33:45 CST 2019
;; MSG SIZE  rcvd: 118

Host info
78.235.252.102.in-addr.arpa domain name pointer 8ta-252-235-78.telkomadsl.co.za.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
78.235.252.102.in-addr.arpa	name = 8ta-252-235-78.telkomadsl.co.za.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
192.248.41.23 attackbotsspam
May 12 17:59:35 shenron sshd[11633]: Did not receive identification string from 192.248.41.23
May 12 18:07:42 shenron sshd[12663]: Invalid user admin from 192.248.41.23
May 12 18:07:42 shenron sshd[12663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.248.41.23
May 12 18:07:44 shenron sshd[12663]: Failed password for invalid user admin from 192.248.41.23 port 38965 ssh2
May 12 18:07:44 shenron sshd[12663]: Received disconnect from 192.248.41.23 port 38965:11: Normal Shutdown, Thank you for playing [preauth]
May 12 18:07:44 shenron sshd[12663]: Disconnected from 192.248.41.23 port 38965 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=192.248.41.23
2020-05-16 07:35:22
190.255.43.138 attackbots
20/5/15@16:47:59: FAIL: Alarm-Network address from=190.255.43.138
...
2020-05-16 07:19:45
218.95.182.149 attackspam
May 15 22:45:03 electroncash sshd[15593]: Invalid user flora from 218.95.182.149 port 38844
May 15 22:45:03 electroncash sshd[15593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.95.182.149 
May 15 22:45:03 electroncash sshd[15593]: Invalid user flora from 218.95.182.149 port 38844
May 15 22:45:05 electroncash sshd[15593]: Failed password for invalid user flora from 218.95.182.149 port 38844 ssh2
May 15 22:47:46 electroncash sshd[16326]: Invalid user deploy from 218.95.182.149 port 36020
...
2020-05-16 07:27:18
51.254.114.105 attackspam
Invalid user developer from 51.254.114.105 port 33080
2020-05-16 07:06:04
125.215.207.44 attackbots
Invalid user james from 125.215.207.44 port 47226
2020-05-16 07:12:34
110.164.93.99 attack
Invalid user configure from 110.164.93.99 port 53292
2020-05-16 07:02:32
79.124.62.66 attackbotsspam
[MK-Root1] Blocked by UFW
2020-05-16 07:11:06
106.13.207.113 attackspam
$f2bV_matches
2020-05-16 07:32:09
39.106.97.149 attackspambots
20 attempts against mh-ssh on hail
2020-05-16 07:21:33
148.70.15.205 attack
Invalid user azureadmin from 148.70.15.205 port 36022
2020-05-16 07:01:24
84.17.48.108 attackspam
(From no-reply@hilkom-digital.de) hi there 
I have just checked norburgchiro.com for the ranking keywords and seen that your SEO metrics could use a boost. 
 
We will improve your SEO metrics and ranks organically and safely, using only whitehat methods, while providing monthly reports and outstanding support. 
 
Please check our pricelist here, we offer SEO at cheap rates. 
https://www.hilkom-digital.de/cheap-seo-packages/ 
 
Start increasing your sales and leads with us, today! 
 
regards 
Hilkom Digital Team 
support@hilkom-digital.de
2020-05-16 07:09:37
51.89.200.123 attackbots
massive-login-attempt
2020-05-16 07:36:22
164.132.42.32 attack
Invalid user jason4 from 164.132.42.32 port 49428
2020-05-16 07:04:45
14.34.223.17 attackbots
...
2020-05-16 07:06:26
141.98.80.44 attack
Auto Fail2Ban report, multiple SMTP login attempts.
2020-05-16 07:28:11

Recently Reported IPs

216.27.56.138 71.88.227.64 210.197.69.233 148.168.107.194
106.83.192.153 222.229.129.59 122.62.47.29 94.185.154.124
194.204.10.139 216.190.178.145 156.87.126.214 185.105.84.126
154.58.255.148 77.91.157.105 194.199.234.29 120.111.193.182
179.182.174.15 44.119.183.151 91.155.90.30 182.203.236.12