Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.152.52.231 botsattackproxy
Bot attacker IP
2025-03-25 13:44:38
104.152.52.145 botsattackproxy
Vulnerability Scanner
2025-03-20 13:41:36
104.152.52.100 spamattackproxy
VoIP blacklist IP
2025-03-14 22:09:59
104.152.52.139 attack
Brute-force attacker IP
2025-03-10 13:45:36
104.152.52.219 botsattackproxy
Bot attacker IP
2025-03-04 13:55:48
104.152.52.124 botsattackproxy
Vulnerability Scanner
2025-02-26 17:12:59
104.152.52.146 botsattackproxy
Bot attacker IP
2025-02-21 12:31:03
104.152.52.161 botsattackproxy
Vulnerability Scanner
2025-02-05 14:00:57
104.152.52.176 botsattackproxy
Botnet DB Scanner
2025-01-20 14:03:26
104.152.52.141 botsattack
Vulnerability Scanner
2025-01-09 22:45:15
104.152.52.165 botsattackproxy
Bot attacker IP
2024-09-24 16:44:08
104.152.52.226 botsattackproxy
Vulnerability Scanner
2024-08-28 12:46:53
104.152.52.142 spambotsattack
Vulnerability Scanner
2024-08-26 12:47:13
104.152.52.116 spamattack
Compromised IP
2024-07-06 14:07:26
104.152.52.204 attack
Bad IP
2024-07-01 12:36:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.152.52.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26659
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.152.52.189.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 02:13:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
189.52.152.104.in-addr.arpa domain name pointer internettl.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.52.152.104.in-addr.arpa	name = internettl.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.202.228.12 attack
Port 22 Scan, PTR: None
2019-12-04 07:56:08
122.225.230.10 attackbots
Dec  4 01:11:15 sauna sshd[11804]: Failed password for games from 122.225.230.10 port 42108 ssh2
...
2019-12-04 07:25:43
187.134.33.202 attackbotsspam
Unauthorized connection attempt from IP address 187.134.33.202 on Port 445(SMB)
2019-12-04 07:35:59
88.214.26.39 attackbots
191203 23:28:10 \[Warning\] Access denied for user 'user'@'88.214.26.39' \(using password: YES\)
191203 23:28:31 \[Warning\] Access denied for user 'user'@'88.214.26.39' \(using password: YES\)
191204  0:28:44 \[Warning\] Access denied for user 'mysql'@'88.214.26.39' \(using password: YES\)
191204  0:28:44 \[Warning\] Access denied for user 'mysql'@'88.214.26.39' \(using password: YES\)
191204  0:28:45 \[Warning\] Access denied for user 'mysql'@'88.214.26.39' \(using password: YES\)
...
2019-12-04 07:51:37
186.224.238.26 attackspam
port scan and connect, tcp 23 (telnet)
2019-12-04 07:23:32
88.214.26.17 attack
191203 23:28:10 \[Warning\] Access denied for user 'user'@'88.214.26.17' \(using password: YES\)
191204  0:28:44 \[Warning\] Access denied for user 'mysql'@'88.214.26.17' \(using password: YES\)
191204  0:28:45 \[Warning\] Access denied for user 'mysql'@'88.214.26.17' \(using password: YES\)
...
2019-12-04 07:39:16
1.197.241.184 attack
Unauthorized connection attempt from IP address 1.197.241.184 on Port 445(SMB)
2019-12-04 07:26:59
104.131.111.64 attackbotsspam
ssh failed login
2019-12-04 07:57:55
112.85.42.175 attackbots
2019-12-04T00:39:16.3840961240 sshd\[9194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.175  user=root
2019-12-04T00:39:18.2221401240 sshd\[9194\]: Failed password for root from 112.85.42.175 port 30925 ssh2
2019-12-04T00:39:21.8400801240 sshd\[9194\]: Failed password for root from 112.85.42.175 port 30925 ssh2
...
2019-12-04 07:43:54
221.122.78.202 attackspambots
Dec  4 04:42:16 gw1 sshd[23239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.78.202
Dec  4 04:42:17 gw1 sshd[23239]: Failed password for invalid user evart from 221.122.78.202 port 34899 ssh2
...
2019-12-04 07:54:50
94.66.198.65 attack
3389BruteforceFW22
2019-12-04 07:38:48
139.59.87.250 attack
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-04 07:27:39
60.54.67.164 attackspam
Port 22 Scan, PTR: PTR record not found
2019-12-04 07:46:00
218.92.0.179 attackspam
SSH Brute-Force attacks
2019-12-04 07:22:10
111.59.93.76 attackspambots
SSH-BruteForce
2019-12-04 08:00:17

Recently Reported IPs

104.152.52.179 104.152.187.164 104.154.43.238 104.154.41.138
104.154.229.138 104.154.56.162 104.154.51.7 104.154.59.227
104.154.61.160 104.154.73.209 104.154.64.242 104.154.56.12
104.154.80.9 104.154.79.238 104.154.88.201 104.154.92.20
104.154.99.51 104.155.0.230 104.154.92.35 104.155.10.166