Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
102.252.66.212 attackspam
Attempts to probe for or exploit a Drupal 7.72 site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2020-07-19 15:09:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.252.66.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43513
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.252.66.75.			IN	A

;; AUTHORITY SECTION:
.			447	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:09:19 CST 2022
;; MSG SIZE  rcvd: 106
Host info
75.66.252.102.in-addr.arpa domain name pointer 8ta-252-66-75.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
75.66.252.102.in-addr.arpa	name = 8ta-252-66-75.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.234.18.158 attack
s3.hscode.pl - SSH Attack
2020-09-22 19:59:26
193.34.186.154 attackbots
Sep 22 08:23:51 firewall sshd[8473]: Invalid user sammy from 193.34.186.154
Sep 22 08:23:53 firewall sshd[8473]: Failed password for invalid user sammy from 193.34.186.154 port 58596 ssh2
Sep 22 08:27:27 firewall sshd[8612]: Invalid user hadoop from 193.34.186.154
...
2020-09-22 19:38:46
122.51.37.26 attackspambots
Sep 22 13:50:06 host1 sshd[25581]: Invalid user localadmin from 122.51.37.26 port 45042
Sep 22 13:50:07 host1 sshd[25581]: Failed password for invalid user localadmin from 122.51.37.26 port 45042 ssh2
Sep 22 13:50:06 host1 sshd[25581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.37.26 
Sep 22 13:50:06 host1 sshd[25581]: Invalid user localadmin from 122.51.37.26 port 45042
Sep 22 13:50:07 host1 sshd[25581]: Failed password for invalid user localadmin from 122.51.37.26 port 45042 ssh2
...
2020-09-22 20:02:03
138.197.216.135 attackspam
(sshd) Failed SSH login from 138.197.216.135 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 22 02:17:32 server2 sshd[5928]: Invalid user jd from 138.197.216.135
Sep 22 02:17:32 server2 sshd[5928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.216.135 
Sep 22 02:17:33 server2 sshd[5928]: Failed password for invalid user jd from 138.197.216.135 port 53806 ssh2
Sep 22 02:29:28 server2 sshd[23893]: Invalid user edi from 138.197.216.135
Sep 22 02:29:28 server2 sshd[23893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.216.135
2020-09-22 19:57:05
156.54.109.225 attack
Brute force attempt
2020-09-22 20:06:13
190.205.255.69 attackspambots
Port Scan
...
2020-09-22 19:45:59
103.226.250.28 attackspam
103.226.250.28 - - [22/Sep/2020:07:23:06 +0100] "POST /wp-login.php HTTP/1.1" 200 2255 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.226.250.28 - - [22/Sep/2020:07:23:09 +0100] "POST /wp-login.php HTTP/1.1" 200 2230 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.226.250.28 - - [22/Sep/2020:07:23:11 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-22 19:50:52
110.185.104.126 attack
2020-09-22T02:51[Censored Hostname] sshd[29079]: Invalid user check from 110.185.104.126 port 35291
2020-09-22T02:51[Censored Hostname] sshd[29079]: Failed password for invalid user check from 110.185.104.126 port 35291 ssh2
2020-09-22T02:55[Censored Hostname] sshd[29089]: Invalid user vnc from 110.185.104.126 port 38049[...]
2020-09-22 20:07:37
190.146.87.202 attackbotsspam
Sep 22 09:43:49 v22019038103785759 sshd\[21692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.146.87.202  user=root
Sep 22 09:43:51 v22019038103785759 sshd\[21692\]: Failed password for root from 190.146.87.202 port 45608 ssh2
Sep 22 09:51:33 v22019038103785759 sshd\[22395\]: Invalid user project from 190.146.87.202 port 50784
Sep 22 09:51:34 v22019038103785759 sshd\[22395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.146.87.202
Sep 22 09:51:35 v22019038103785759 sshd\[22395\]: Failed password for invalid user project from 190.146.87.202 port 50784 ssh2
...
2020-09-22 19:57:58
106.75.79.172 attackbots
Unauthorized connection attempt from IP address 106.75.79.172
2020-09-22 19:33:02
114.246.34.150 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-09-22 19:34:23
109.74.15.197 attackspam
"GET /robots.txt HTTP/1.1" 404
"POST /Admin04e1e217/Login.php HTTP/1.1" 404
"GET /l.php HTTP/1.1" 404
"GET /phpinfo.php HTTP/1.1" 404
"GET /test.php HTTP/1.1" 404
"POST /index.php HTTP/1.1" 404
"POST /bbs.php HTTP/1.1" 404
"POST /forum.php HTTP/1.1" 404
"POST /forums.php HTTP/1.1" 404
"POST /bbs/index.php HTTP/1.1" 404
"POST /forum/index.php HTTP/1.1" 404
"POST /forums/index.php HTTP/1.1" 404
"POST /cgi-bin/php?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%6
2020-09-22 19:32:00
187.109.253.246 attackspambots
Sep 22 12:02:00 gospond sshd[20107]: Failed password for root from 187.109.253.246 port 45150 ssh2
Sep 22 12:06:33 gospond sshd[20188]: Invalid user hadoop from 187.109.253.246 port 53148
Sep 22 12:06:33 gospond sshd[20188]: Invalid user hadoop from 187.109.253.246 port 53148
...
2020-09-22 20:03:31
111.229.222.118 attackspambots
(sshd) Failed SSH login from 111.229.222.118 (CN/China/-): 5 in the last 3600 secs
2020-09-22 19:34:39
203.189.239.116 attack
 TCP (SYN) 203.189.239.116:53046 -> port 8080, len 60
2020-09-22 19:48:24

Recently Reported IPs

102.32.77.82 102.32.134.89 102.32.79.251 102.36.250.197
102.27.64.88 102.37.111.241 195.36.81.38 102.37.107.160
102.37.15.42 102.37.99.36 102.38.66.155 104.21.60.34
102.38.70.202 102.37.3.146 102.38.10.143 102.40.211.60
102.39.100.26 102.41.129.65 102.41.1.178 102.41.151.206