Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.2.52.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8932
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.2.52.224.			IN	A

;; AUTHORITY SECTION:
.			52	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:49:00 CST 2022
;; MSG SIZE  rcvd: 105
Host info
224.52.2.104.in-addr.arpa domain name pointer 104-2-52-224.lightspeed.hstntx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
224.52.2.104.in-addr.arpa	name = 104-2-52-224.lightspeed.hstntx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.203.77.51 attackspambots
Oct  6 22:59:43 *** sshd[31481]: User root from 159.203.77.51 not allowed because not listed in AllowUsers
2019-10-07 07:08:51
67.207.95.103 attackspambots
Oct  7 03:26:42 areeb-Workstation sshd[13049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.95.103
Oct  7 03:26:45 areeb-Workstation sshd[13049]: Failed password for invalid user Club@123 from 67.207.95.103 port 45004 ssh2
...
2019-10-07 06:58:18
113.57.130.172 attack
Oct  6 21:31:59 hcbbdb sshd\[3575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.130.172  user=root
Oct  6 21:32:00 hcbbdb sshd\[3575\]: Failed password for root from 113.57.130.172 port 48736 ssh2
Oct  6 21:35:43 hcbbdb sshd\[3967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.130.172  user=root
Oct  6 21:35:45 hcbbdb sshd\[3967\]: Failed password for root from 113.57.130.172 port 49512 ssh2
Oct  6 21:39:24 hcbbdb sshd\[4366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.130.172  user=root
2019-10-07 07:20:16
185.176.25.42 attack
Oct  6 18:46:59 xtremcommunity sshd\[258671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.176.25.42  user=root
Oct  6 18:47:01 xtremcommunity sshd\[258671\]: Failed password for root from 185.176.25.42 port 44372 ssh2
Oct  6 18:51:19 xtremcommunity sshd\[258770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.176.25.42  user=root
Oct  6 18:51:21 xtremcommunity sshd\[258770\]: Failed password for root from 185.176.25.42 port 57316 ssh2
Oct  6 18:55:44 xtremcommunity sshd\[258847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.176.25.42  user=root
...
2019-10-07 07:01:09
86.34.215.25 attackspam
Automatic report - Banned IP Access
2019-10-07 07:29:26
111.122.181.250 attack
Oct  7 00:43:26 SilenceServices sshd[12574]: Failed password for root from 111.122.181.250 port 2266 ssh2
Oct  7 00:46:18 SilenceServices sshd[13327]: Failed password for root from 111.122.181.250 port 2267 ssh2
2019-10-07 07:00:03
190.104.68.49 attackbots
SPF Fail sender not permitted to send mail for @evilazrael.de
2019-10-07 07:21:05
112.169.255.1 attackspam
Oct  6 22:50:54 thevastnessof sshd[32514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.255.1
...
2019-10-07 07:09:23
78.46.185.147 attackspambots
DATE:2019-10-06 21:47:51, IP:78.46.185.147, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-07 07:27:37
120.131.13.186 attackspambots
Oct  6 23:14:53 microserver sshd[37885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.13.186  user=root
Oct  6 23:14:55 microserver sshd[37885]: Failed password for root from 120.131.13.186 port 42590 ssh2
Oct  6 23:17:58 microserver sshd[38435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.13.186  user=root
Oct  6 23:18:00 microserver sshd[38435]: Failed password for root from 120.131.13.186 port 3818 ssh2
Oct  6 23:21:00 microserver sshd[38983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.13.186  user=root
Oct  6 23:33:07 microserver sshd[40366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.13.186  user=root
Oct  6 23:33:09 microserver sshd[40366]: Failed password for root from 120.131.13.186 port 3490 ssh2
Oct  6 23:36:13 microserver sshd[40950]: pam_unix(sshd:auth): authentication failure; logname= uid=0
2019-10-07 07:24:51
178.128.178.187 attackbotsspam
fail2ban honeypot
2019-10-07 07:02:30
92.63.194.69 attackbots
Connection by 92.63.194.69 on port: 111 got caught by honeypot at 10/6/2019 3:13:20 PM
2019-10-07 07:24:24
49.234.62.144 attack
Repeated brute force against a port
2019-10-07 07:30:08
193.112.203.71 attackspam
fail2ban honeypot
2019-10-07 07:12:06
61.166.173.13 attack
Unauthorised access (Oct  6) SRC=61.166.173.13 LEN=40 TOS=0x10 PREC=0x40 TTL=48 ID=22982 TCP DPT=8080 WINDOW=29118 SYN
2019-10-07 07:34:16

Recently Reported IPs

104.20.108.13 104.2.237.162 104.2.250.153 104.20.164.88
104.20.109.13 104.20.165.88 104.2.184.131 101.109.22.174
104.20.204.19 104.20.203.9 123.252.253.190 104.20.203.27
104.20.209.5 104.20.209.62 104.20.211.109 104.20.203.62
104.20.212.109 104.20.208.62 101.109.22.180 104.20.202.9