City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| Type | Details | Datetime |
|---|---|---|
| botsattackproxy | Bot attacker IP |
2024-05-16 18:15:14 |
| attack | Scan port |
2024-01-11 13:53:36 |
| attack | Scan port |
2023-10-18 12:49:41 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.152.52.231 | botsattackproxy | Bot attacker IP |
2025-03-25 13:44:38 |
| 104.152.52.145 | botsattackproxy | Vulnerability Scanner |
2025-03-20 13:41:36 |
| 104.152.52.100 | spamattackproxy | VoIP blacklist IP |
2025-03-14 22:09:59 |
| 104.152.52.139 | attack | Brute-force attacker IP |
2025-03-10 13:45:36 |
| 104.152.52.219 | botsattackproxy | Bot attacker IP |
2025-03-04 13:55:48 |
| 104.152.52.124 | botsattackproxy | Vulnerability Scanner |
2025-02-26 17:12:59 |
| 104.152.52.146 | botsattackproxy | Bot attacker IP |
2025-02-21 12:31:03 |
| 104.152.52.161 | botsattackproxy | Vulnerability Scanner |
2025-02-05 14:00:57 |
| 104.152.52.176 | botsattackproxy | Botnet DB Scanner |
2025-01-20 14:03:26 |
| 104.152.52.141 | botsattack | Vulnerability Scanner |
2025-01-09 22:45:15 |
| 104.152.52.165 | botsattackproxy | Bot attacker IP |
2024-09-24 16:44:08 |
| 104.152.52.226 | botsattackproxy | Vulnerability Scanner |
2024-08-28 12:46:53 |
| 104.152.52.142 | spambotsattack | Vulnerability Scanner |
2024-08-26 12:47:13 |
| 104.152.52.116 | spamattack | Compromised IP |
2024-07-06 14:07:26 |
| 104.152.52.204 | attack | Bad IP |
2024-07-01 12:36:27 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.152.52.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28831
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.152.52.243. IN A
;; AUTHORITY SECTION:
. 422 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023101703 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 18 12:49:38 CST 2023
;; MSG SIZE rcvd: 107
243.52.152.104.in-addr.arpa domain name pointer internettl.org.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
243.52.152.104.in-addr.arpa name = internettl.org.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 117.221.197.25 | attackbotsspam | 1580847663 - 02/04/2020 21:21:03 Host: 117.221.197.25/117.221.197.25 Port: 445 TCP Blocked |
2020-02-05 04:30:01 |
| 106.13.86.236 | attack | Feb 4 21:20:57 dedicated sshd[12164]: Invalid user teamspeak from 106.13.86.236 port 54580 Feb 4 21:20:59 dedicated sshd[12164]: Failed password for invalid user teamspeak from 106.13.86.236 port 54580 ssh2 Feb 4 21:20:57 dedicated sshd[12164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.86.236 Feb 4 21:20:57 dedicated sshd[12164]: Invalid user teamspeak from 106.13.86.236 port 54580 Feb 4 21:20:59 dedicated sshd[12164]: Failed password for invalid user teamspeak from 106.13.86.236 port 54580 ssh2 |
2020-02-05 04:37:57 |
| 140.143.238.108 | attackbotsspam | Unauthorized connection attempt detected from IP address 140.143.238.108 to port 2220 [J] |
2020-02-05 04:48:21 |
| 200.91.225.60 | attack | Honeypot attack, port: 445, PTR: 60.225.91.200.static.host.ifxnetworks.com. |
2020-02-05 04:54:26 |
| 201.209.235.210 | attackbots | Honeypot attack, port: 445, PTR: 201-209-235-210.genericrev.cantv.net. |
2020-02-05 04:41:21 |
| 51.75.25.48 | attack | Feb 4 21:47:49 markkoudstaal sshd[27410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.25.48 Feb 4 21:47:52 markkoudstaal sshd[27410]: Failed password for invalid user nitish from 51.75.25.48 port 37122 ssh2 Feb 4 21:50:19 markkoudstaal sshd[27816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.25.48 |
2020-02-05 04:52:44 |
| 94.191.78.128 | attack | Feb 4 10:19:04 hpm sshd\[17315\]: Invalid user qwerty123456 from 94.191.78.128 Feb 4 10:19:04 hpm sshd\[17315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.78.128 Feb 4 10:19:06 hpm sshd\[17315\]: Failed password for invalid user qwerty123456 from 94.191.78.128 port 39554 ssh2 Feb 4 10:21:02 hpm sshd\[17514\]: Invalid user @abc123 from 94.191.78.128 Feb 4 10:21:02 hpm sshd\[17514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.78.128 |
2020-02-05 04:30:32 |
| 91.121.48.165 | attackspambots | Unauthorized connection attempt detected from IP address 91.121.48.165 to port 1433 [J] |
2020-02-05 04:53:29 |
| 222.186.42.75 | attackspambots | Unauthorized connection attempt detected from IP address 222.186.42.75 to port 22 [J] |
2020-02-05 04:58:23 |
| 131.196.0.137 | attack | 2019-06-22 15:10:08 1hefmO-0005z4-Qd SMTP connection from \(\[131.196.0.136\]\) \[131.196.0.137\]:31823 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-22 15:10:50 1hefn4-00061X-AO SMTP connection from \(\[131.196.0.136\]\) \[131.196.0.137\]:31996 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-22 15:11:26 1hefnf-000625-MQ SMTP connection from \(\[131.196.0.136\]\) \[131.196.0.137\]:32143 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 04:23:09 |
| 106.54.208.123 | attackspambots | 2020-02-04T15:00:13.6000351495-001 sshd[56912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.208.123 user=root 2020-02-04T15:00:15.3598121495-001 sshd[56912]: Failed password for root from 106.54.208.123 port 34458 ssh2 2020-02-04T15:02:41.9917011495-001 sshd[58928]: Invalid user speech-dispatcher from 106.54.208.123 port 57776 2020-02-04T15:02:42.0002891495-001 sshd[58928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.208.123 2020-02-04T15:02:41.9917011495-001 sshd[58928]: Invalid user speech-dispatcher from 106.54.208.123 port 57776 2020-02-04T15:02:44.0766701495-001 sshd[58928]: Failed password for invalid user speech-dispatcher from 106.54.208.123 port 57776 ssh2 2020-02-04T15:05:22.0531251495-001 sshd[61528]: Invalid user slide from 106.54.208.123 port 52872 2020-02-04T15:05:22.0620691495-001 sshd[61528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ru ... |
2020-02-05 04:32:13 |
| 192.176.48.174 | attackspambots | Honeypot attack, port: 5555, PTR: a174.broadband8.quicknet.se. |
2020-02-05 04:57:33 |
| 200.233.240.48 | attack | Unauthorized connection attempt detected from IP address 200.233.240.48 to port 2220 [J] |
2020-02-05 04:58:38 |
| 122.117.179.59 | attackspam | firewall-block, port(s): 23/tcp |
2020-02-05 04:33:27 |
| 185.198.162.54 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-05 05:00:34 |