Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
109.122.241.2 attack
Unauthorized connection attempt from IP address 109.122.241.2 on Port 445(SMB)
2020-10-10 00:38:37
109.122.241.2 attackspam
Unauthorized connection attempt from IP address 109.122.241.2 on Port 445(SMB)
2020-10-09 16:25:17
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.122.241.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36786
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.122.241.252.		IN	A

;; AUTHORITY SECTION:
.			167	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:56:43 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 252.241.122.109.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.241.122.109.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
83.21.76.232 attackbots
Automatic report - Port Scan Attack
2020-04-04 08:07:15
189.218.41.159 attackspambots
IP attempted unauthorised action
2020-04-04 08:07:48
167.114.89.199 attackbotsspam
Attempt to use web contact page to send SPAM
2020-04-04 07:40:46
188.166.46.64 attackbotsspam
Apr  3 16:54:20 server1 sshd\[2925\]: Failed password for root from 188.166.46.64 port 44506 ssh2
Apr  3 16:57:59 server1 sshd\[4094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.46.64  user=root
Apr  3 16:58:00 server1 sshd\[4094\]: Failed password for root from 188.166.46.64 port 55958 ssh2
Apr  3 17:01:46 server1 sshd\[5075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.46.64  user=root
Apr  3 17:01:48 server1 sshd\[5075\]: Failed password for root from 188.166.46.64 port 39178 ssh2
...
2020-04-04 07:59:44
103.129.223.98 attackspam
Invalid user mtf from 103.129.223.98 port 51020
2020-04-04 07:57:38
212.204.65.160 attackspambots
Invalid user mongo from 212.204.65.160 port 53154
2020-04-04 07:58:35
177.125.164.225 attack
Apr  4 00:33:56 meumeu sshd[18307]: Failed password for root from 177.125.164.225 port 43090 ssh2
Apr  4 00:39:01 meumeu sshd[19070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.125.164.225 
Apr  4 00:39:03 meumeu sshd[19070]: Failed password for invalid user yuzhi from 177.125.164.225 port 53106 ssh2
...
2020-04-04 07:38:36
62.234.193.119 attack
Invalid user ej from 62.234.193.119 port 38792
2020-04-04 07:55:33
106.13.168.107 attack
Invalid user rey from 106.13.168.107 port 49392
2020-04-04 07:46:18
94.191.119.176 attackspam
SSH Authentication Attempts Exceeded
2020-04-04 08:06:37
106.13.128.234 attack
2020-04-04T00:45:20.378674vps773228.ovh.net sshd[2519]: Failed password for root from 106.13.128.234 port 44830 ssh2
2020-04-04T00:48:42.765360vps773228.ovh.net sshd[3759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.128.234  user=root
2020-04-04T00:48:44.341142vps773228.ovh.net sshd[3759]: Failed password for root from 106.13.128.234 port 36626 ssh2
2020-04-04T00:52:05.013752vps773228.ovh.net sshd[5008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.128.234  user=root
2020-04-04T00:52:07.457885vps773228.ovh.net sshd[5008]: Failed password for root from 106.13.128.234 port 56656 ssh2
...
2020-04-04 07:47:09
69.30.232.138 attack
firewall-block, port(s): 11211/udp
2020-04-04 07:54:33
119.90.61.10 attackspambots
Apr  4 00:11:20 pi sshd[17973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.61.10  user=root
Apr  4 00:11:22 pi sshd[17973]: Failed password for invalid user root from 119.90.61.10 port 48064 ssh2
2020-04-04 07:39:30
115.226.74.82 attackspam
$f2bV_matches
2020-04-04 07:56:53
103.89.91.156 attackbots
RDP brute force attack detected by fail2ban
2020-04-04 08:00:45

Recently Reported IPs

109.122.241.222 109.122.241.198 109.122.241.46 109.122.241.49
109.122.241.60 109.122.242.24 109.122.242.106 109.122.243.1
109.122.242.198 109.122.242.40 109.122.242.56 109.122.242.203
109.122.243.124 109.122.242.140 109.122.243.167 109.122.243.88
109.122.244.136 109.122.244.183 109.122.244.115 109.122.244.84