Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackproxy
Bot attacker IP
2024-04-15 01:49:14
attack
Scan port
2024-01-31 13:42:38
Comments on same subnet:
IP Type Details Datetime
104.152.52.231 botsattackproxy
Bot attacker IP
2025-03-25 13:44:38
104.152.52.145 botsattackproxy
Vulnerability Scanner
2025-03-20 13:41:36
104.152.52.100 spamattackproxy
VoIP blacklist IP
2025-03-14 22:09:59
104.152.52.139 attack
Brute-force attacker IP
2025-03-10 13:45:36
104.152.52.219 botsattackproxy
Bot attacker IP
2025-03-04 13:55:48
104.152.52.124 botsattackproxy
Vulnerability Scanner
2025-02-26 17:12:59
104.152.52.146 botsattackproxy
Bot attacker IP
2025-02-21 12:31:03
104.152.52.161 botsattackproxy
Vulnerability Scanner
2025-02-05 14:00:57
104.152.52.176 botsattackproxy
Botnet DB Scanner
2025-01-20 14:03:26
104.152.52.141 botsattack
Vulnerability Scanner
2025-01-09 22:45:15
104.152.52.165 botsattackproxy
Bot attacker IP
2024-09-24 16:44:08
104.152.52.226 botsattackproxy
Vulnerability Scanner
2024-08-28 12:46:53
104.152.52.142 spambotsattack
Vulnerability Scanner
2024-08-26 12:47:13
104.152.52.116 spamattack
Compromised IP
2024-07-06 14:07:26
104.152.52.204 attack
Bad IP
2024-07-01 12:36:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.152.52.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.152.52.97.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024013002 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 31 13:42:35 CST 2024
;; MSG SIZE  rcvd: 106
Host info
97.52.152.104.in-addr.arpa domain name pointer internettl.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
97.52.152.104.in-addr.arpa	name = internettl.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
60.195.191.5 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-01-09 17:23:35
45.189.73.29 attackbotsspam
unauthorized connection attempt
2020-01-09 17:26:07
116.55.248.101 attackbots
unauthorized connection attempt
2020-01-09 17:43:28
203.99.191.63 attack
unauthorized connection attempt
2020-01-09 17:52:33
14.241.224.85 attack
unauthorized connection attempt
2020-01-09 17:28:25
117.3.148.130 attackspambots
unauthorized connection attempt
2020-01-09 18:00:46
187.60.35.234 attackbots
unauthorized connection attempt
2020-01-09 17:34:13
89.121.143.78 attack
unauthorized connection attempt
2020-01-09 17:47:25
122.52.135.207 attack
20/1/8@23:57:07: FAIL: Alarm-Intrusion address from=122.52.135.207
...
2020-01-09 17:40:22
115.240.192.139 attackbotsspam
Honeypot attack, port: 445, PTR: 115.240.192.139.static.jio.com.
2020-01-09 18:01:16
103.105.253.194 attack
unauthorized connection attempt
2020-01-09 17:45:54
118.174.18.247 attackspambots
unauthorized connection attempt
2020-01-09 17:41:20
66.249.69.10 attackspambots
unauthorized connection attempt
2020-01-09 17:23:18
201.243.108.209 attack
unauthorized connection attempt
2020-01-09 17:31:34
94.121.91.243 attackbotsspam
unauthorized connection attempt
2020-01-09 18:03:39

Recently Reported IPs

5.115.159.223 146.70.224.49 42.122.165.8 10.0.35.225
160.76.44.221 219.153.96.211 201.149.14.18 53.78.14.145
10.43.64.78 23.90.172.208 38.242.181.242 52.98.168.197
79.173.148.202 137.22.173.167 11.4.7.0 128.199.148.26
249.224.30.141 119.108.125.56 218.17.39.4 188.57.118.34