Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.105.210.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5293
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.105.210.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025111402 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 15 05:30:49 CST 2025
;; MSG SIZE  rcvd: 107
Host info
52.210.105.109.in-addr.arpa domain name pointer zl-dfwc-us-gp1-wk106a.internet-census.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.210.105.109.in-addr.arpa	name = zl-dfwc-us-gp1-wk106a.internet-census.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
73.200.19.122 attackbots
Attempts to probe for or exploit a Drupal site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-06-22 14:18:39
162.243.144.171 attackspam
scan z
2019-06-22 14:21:52
124.178.233.118 attack
Jun 22 08:03:33 mail sshd\[27570\]: Invalid user charity from 124.178.233.118
Jun 22 08:03:33 mail sshd\[27570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.178.233.118
Jun 22 08:03:34 mail sshd\[27570\]: Failed password for invalid user charity from 124.178.233.118 port 54755 ssh2
...
2019-06-22 14:10:29
187.120.133.65 attackbotsspam
SMTP-sasl brute force
...
2019-06-22 14:31:32
138.36.188.246 attack
SMTP-sasl brute force
...
2019-06-22 14:27:01
90.173.252.82 attackbotsspam
web-1 [ssh_2] SSH Attack
2019-06-22 14:48:35
199.249.230.103 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.249.230.103  user=root
Failed password for root from 199.249.230.103 port 37822 ssh2
Failed password for root from 199.249.230.103 port 37822 ssh2
Failed password for root from 199.249.230.103 port 37822 ssh2
Failed password for root from 199.249.230.103 port 37822 ssh2
2019-06-22 14:00:56
27.76.118.38 attackbotsspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-22 06:36:11]
2019-06-22 14:09:14
179.15.36.163 attackspam
Autoban   179.15.36.163 REJECT
2019-06-22 14:15:34
180.121.138.188 attackbots
2019-06-22T06:34:01.146275 X postfix/smtpd[34046]: warning: unknown[180.121.138.188]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-22T06:34:27.149178 X postfix/smtpd[34046]: warning: unknown[180.121.138.188]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-22T06:35:36.238352 X postfix/smtpd[34059]: warning: unknown[180.121.138.188]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-22 14:45:25
218.64.216.56 attackspam
SMB Server BruteForce Attack
2019-06-22 14:19:46
209.17.96.210 attackspam
Automatic report - Web App Attack
2019-06-22 14:58:15
218.28.23.93 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-06-22 14:26:34
191.53.222.219 attack
SMTP-sasl brute force
...
2019-06-22 14:16:59
159.65.46.86 attackbotsspam
SSH invalid-user multiple login try
2019-06-22 14:52:33

Recently Reported IPs

109.105.210.54 100.24.37.81 54.229.169.67 20.150.202.39
3.252.154.138 185.180.140.117 47.251.8.207 198.18.130.87
139.224.196.30 180.101.242.212 52.18.59.77 66.249.69.36
192.168.86.1 117.178.14.35 212.83.131.72 162.141.165.179
172.236.137.159 162.216.149.145 123.20.189.131 3.252.39.56