Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.152.52.231 botsattackproxy
Bot attacker IP
2025-03-25 13:44:38
104.152.52.145 botsattackproxy
Vulnerability Scanner
2025-03-20 13:41:36
104.152.52.100 spamattackproxy
VoIP blacklist IP
2025-03-14 22:09:59
104.152.52.139 attack
Brute-force attacker IP
2025-03-10 13:45:36
104.152.52.219 botsattackproxy
Bot attacker IP
2025-03-04 13:55:48
104.152.52.124 botsattackproxy
Vulnerability Scanner
2025-02-26 17:12:59
104.152.52.146 botsattackproxy
Bot attacker IP
2025-02-21 12:31:03
104.152.52.161 botsattackproxy
Vulnerability Scanner
2025-02-05 14:00:57
104.152.52.176 botsattackproxy
Botnet DB Scanner
2025-01-20 14:03:26
104.152.52.141 botsattack
Vulnerability Scanner
2025-01-09 22:45:15
104.152.52.165 botsattackproxy
Bot attacker IP
2024-09-24 16:44:08
104.152.52.226 botsattackproxy
Vulnerability Scanner
2024-08-28 12:46:53
104.152.52.142 spambotsattack
Vulnerability Scanner
2024-08-26 12:47:13
104.152.52.116 spamattack
Compromised IP
2024-07-06 14:07:26
104.152.52.204 attack
Bad IP
2024-07-01 12:36:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.152.52.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53686
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.152.52.60.			IN	A

;; AUTHORITY SECTION:
.			205	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:53:34 CST 2022
;; MSG SIZE  rcvd: 106
Host info
60.52.152.104.in-addr.arpa domain name pointer internettl.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
60.52.152.104.in-addr.arpa	name = internettl.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.51.154.136 attackspambots
Invalid user inma from 122.51.154.136 port 43074
2020-06-02 20:04:34
202.51.110.214 attackbots
Jun  2 16:06:50 gw1 sshd[26842]: Failed password for root from 202.51.110.214 port 34059 ssh2
...
2020-06-02 20:13:33
49.234.28.109 attackbots
Jun  2 02:03:17 web9 sshd\[22483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.109  user=root
Jun  2 02:03:19 web9 sshd\[22483\]: Failed password for root from 49.234.28.109 port 39980 ssh2
Jun  2 02:06:03 web9 sshd\[22825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.109  user=root
Jun  2 02:06:04 web9 sshd\[22825\]: Failed password for root from 49.234.28.109 port 43458 ssh2
Jun  2 02:08:55 web9 sshd\[23185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.109  user=root
2020-06-02 20:21:57
36.230.174.194 attackspambots
Jun  2 14:08:48 fhem-rasp sshd[8139]: Failed password for root from 36.230.174.194 port 41178 ssh2
Jun  2 14:08:50 fhem-rasp sshd[8139]: Connection closed by authenticating user root 36.230.174.194 port 41178 [preauth]
...
2020-06-02 20:26:25
210.209.152.57 attackspambots
Jun  2 14:08:45 fhem-rasp sshd[8131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.152.57  user=root
Jun  2 14:08:47 fhem-rasp sshd[8131]: Failed password for root from 210.209.152.57 port 47149 ssh2
...
2020-06-02 20:33:10
181.129.161.28 attackbotsspam
2020-06-02T13:58:49.579909ns386461 sshd\[15235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.161.28  user=root
2020-06-02T13:58:52.010088ns386461 sshd\[15235\]: Failed password for root from 181.129.161.28 port 48528 ssh2
2020-06-02T14:04:55.605674ns386461 sshd\[20782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.161.28  user=root
2020-06-02T14:04:57.613060ns386461 sshd\[20782\]: Failed password for root from 181.129.161.28 port 47362 ssh2
2020-06-02T14:08:47.612478ns386461 sshd\[24725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.161.28  user=root
...
2020-06-02 20:30:53
95.216.16.51 attack
20 attempts against mh-misbehave-ban on sonic
2020-06-02 20:15:22
43.226.147.239 attackspambots
2020-06-02T08:47:13.187003shield sshd\[24687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.147.239  user=root
2020-06-02T08:47:14.750167shield sshd\[24687\]: Failed password for root from 43.226.147.239 port 42220 ssh2
2020-06-02T08:50:43.888086shield sshd\[25098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.147.239  user=root
2020-06-02T08:50:45.612072shield sshd\[25098\]: Failed password for root from 43.226.147.239 port 59216 ssh2
2020-06-02T08:54:08.823257shield sshd\[25516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.147.239  user=root
2020-06-02 20:12:48
195.242.218.8 attackbots
spam spam spam
2020-06-02 20:42:42
109.155.119.184 attack
Attempted connection to port 23.
2020-06-02 20:10:38
185.45.165.100 attackbotsspam
Jun  2 14:08:47 fhem-rasp sshd[8172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.45.165.100  user=pi
Jun  2 14:08:49 fhem-rasp sshd[8172]: Failed password for invalid user pi from 185.45.165.100 port 49754 ssh2
...
2020-06-02 20:27:40
159.138.65.33 attackbotsspam
Jun  2 02:20:20 web9 sshd\[24582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.138.65.33  user=root
Jun  2 02:20:23 web9 sshd\[24582\]: Failed password for root from 159.138.65.33 port 44506 ssh2
Jun  2 02:23:19 web9 sshd\[24911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.138.65.33  user=root
Jun  2 02:23:21 web9 sshd\[24911\]: Failed password for root from 159.138.65.33 port 39862 ssh2
Jun  2 02:26:18 web9 sshd\[25259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.138.65.33  user=root
2020-06-02 20:30:23
104.236.137.194 attack
2020-06-02T13:54:15.221144v22018076590370373 sshd[5699]: Failed password for root from 104.236.137.194 port 53818 ssh2
2020-06-02T14:01:34.432638v22018076590370373 sshd[24246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.137.194  user=root
2020-06-02T14:01:36.512005v22018076590370373 sshd[24246]: Failed password for root from 104.236.137.194 port 56482 ssh2
2020-06-02T14:08:40.158959v22018076590370373 sshd[7729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.137.194  user=root
2020-06-02T14:08:42.388628v22018076590370373 sshd[7729]: Failed password for root from 104.236.137.194 port 59142 ssh2
...
2020-06-02 20:41:06
188.173.97.144 attack
Jun  2 12:05:16 jumpserver sshd[48077]: Failed password for root from 188.173.97.144 port 49136 ssh2
Jun  2 12:08:47 jumpserver sshd[48096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.97.144  user=root
Jun  2 12:08:49 jumpserver sshd[48096]: Failed password for root from 188.173.97.144 port 54326 ssh2
...
2020-06-02 20:27:17
27.22.48.61 attackbots
Jun  2 08:08:31 esmtp postfix/smtpd[6002]: lost connection after AUTH from unknown[27.22.48.61]
Jun  2 08:08:32 esmtp postfix/smtpd[6002]: lost connection after AUTH from unknown[27.22.48.61]
Jun  2 08:08:35 esmtp postfix/smtpd[6002]: lost connection after AUTH from unknown[27.22.48.61]
Jun  2 08:08:40 esmtp postfix/smtpd[6002]: lost connection after AUTH from unknown[27.22.48.61]
Jun  2 08:08:42 esmtp postfix/smtpd[6002]: lost connection after AUTH from unknown[27.22.48.61]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.22.48.61
2020-06-02 20:41:52

Recently Reported IPs

165.16.105.186 101.43.53.249 179.49.134.241 194.186.150.18
167.58.240.57 51.79.65.236 114.119.151.153 54.176.221.66
88.147.101.10 211.48.140.245 75.127.2.207 94.230.247.62
163.53.254.28 110.235.140.4 128.199.154.139 112.154.112.128
223.88.12.154 47.92.114.121 154.124.72.54 34.142.70.100