Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.252.242.223
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43978
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.252.242.223.		IN	A

;; AUTHORITY SECTION:
.			431	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 22 00:45:26 CST 2023
;; MSG SIZE  rcvd: 108
Host info
223.242.252.102.in-addr.arpa domain name pointer 8ta-252-242-223.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
223.242.252.102.in-addr.arpa	name = 8ta-252-242-223.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
86.97.148.88 attack
Unauthorized connection attempt from IP address 86.97.148.88 on Port 445(SMB)
2020-06-05 23:32:19
114.119.160.98 attackspambots
Auto block
2020-06-05 23:45:11
63.135.25.144 attack
Unauthorized connection attempt detected from IP address 63.135.25.144 to port 5555
2020-06-06 00:14:24
202.51.126.4 attackbotsspam
Brute-force attempt banned
2020-06-06 00:20:44
222.186.31.166 attackspam
Jun  5 18:09:44 * sshd[14590]: Failed password for root from 222.186.31.166 port 61077 ssh2
2020-06-06 00:16:58
98.110.243.204 attack
detected by Fail2Ban
2020-06-06 00:22:44
119.28.116.166 attack
Jun  5 14:27:13 marvibiene sshd[55888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.116.166  user=root
Jun  5 14:27:15 marvibiene sshd[55888]: Failed password for root from 119.28.116.166 port 57722 ssh2
Jun  5 14:37:14 marvibiene sshd[55993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.116.166  user=root
Jun  5 14:37:17 marvibiene sshd[55993]: Failed password for root from 119.28.116.166 port 33888 ssh2
...
2020-06-05 23:34:32
61.227.186.122 attackspam
firewall-block, port(s): 23/tcp
2020-06-06 00:17:54
106.197.222.247 attack
1591358440 - 06/05/2020 14:00:40 Host: 106.197.222.247/106.197.222.247 Port: 445 TCP Blocked
2020-06-05 23:45:45
77.52.185.59 attackspambots
Unauthorized connection attempt detected from IP address 77.52.185.59 to port 23
2020-06-06 00:07:33
46.38.145.253 attackbotsspam
Jun  5 17:26:00 relay postfix/smtpd\[30570\]: warning: unknown\[46.38.145.253\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  5 17:27:15 relay postfix/smtpd\[6186\]: warning: unknown\[46.38.145.253\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  5 17:27:33 relay postfix/smtpd\[30570\]: warning: unknown\[46.38.145.253\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  5 17:28:49 relay postfix/smtpd\[6186\]: warning: unknown\[46.38.145.253\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  5 17:29:09 relay postfix/smtpd\[30570\]: warning: unknown\[46.38.145.253\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-05 23:41:36
139.192.206.176 attack
Automatic report - XMLRPC Attack
2020-06-06 00:09:08
223.206.240.89 attackspambots
Unauthorized connection attempt from IP address 223.206.240.89 on Port 445(SMB)
2020-06-05 23:44:50
180.76.101.244 attackspambots
Jun  5 13:55:24 prox sshd[4526]: Failed password for root from 180.76.101.244 port 42334 ssh2
2020-06-06 00:18:42
167.172.195.227 attackbotsspam
Jun  5 17:10:22 hosting sshd[6458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.195.227  user=root
Jun  5 17:10:24 hosting sshd[6458]: Failed password for root from 167.172.195.227 port 45862 ssh2
...
2020-06-06 00:20:59

Recently Reported IPs

102.252.66.179 102.253.128.206 103.131.29.22 103.131.27.57
103.131.5.225 103.131.253.136 102.252.8.166 103.131.229.249
103.131.245.38 103.131.249.87 103.131.228.161 103.131.238.0
103.131.227.200 102.253.253.199 103.131.236.254 103.131.212.219
103.131.202.103 103.131.203.205 103.131.214.18 103.131.19.240