Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Moscow

Region: Moscow (City)

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.252.30.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45934
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.252.30.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 21 19:43:00 CST 2024
;; MSG SIZE  rcvd: 106
Host info
12.30.252.109.in-addr.arpa domain name pointer 109-252-30-12.nat.spd-mgts.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.30.252.109.in-addr.arpa	name = 109-252-30-12.nat.spd-mgts.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.44.66.99 attackbotsspam
$f2bV_matches
2020-05-09 00:49:22
189.168.28.44 attack
May  8 14:11:37 [host] kernel: [5568710.297653] [U
May  8 14:11:41 [host] kernel: [5568714.865515] [U
May  8 14:11:42 [host] kernel: [5568715.531443] [U
May  8 14:11:59 [host] kernel: [5568732.697426] [U
May  8 14:12:04 [host] kernel: [5568737.297928] [U
May  8 14:12:31 [host] kernel: [5568764.685995] [U
2020-05-09 00:12:12
138.68.236.50 attackbotsspam
May  8 14:07:11 dev0-dcde-rnet sshd[25779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.236.50
May  8 14:07:13 dev0-dcde-rnet sshd[25779]: Failed password for invalid user pik from 138.68.236.50 port 57860 ssh2
May  8 14:12:01 dev0-dcde-rnet sshd[25848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.236.50
2020-05-09 00:45:34
62.102.148.68 attackspam
$f2bV_matches
2020-05-09 00:47:56
60.199.223.120 attackspam
Icarus honeypot on github
2020-05-09 00:20:52
218.92.0.184 attackspambots
Brute-force attempt banned
2020-05-09 00:53:02
185.175.93.6 attackbots
firewall-block, port(s): 3373/tcp, 3393/tcp, 3396/tcp, 3397/tcp, 3402/tcp, 3407/tcp
2020-05-09 00:44:34
173.249.47.246 attackspambots
May  8 18:15:51 163-172-32-151 sshd[30540]: Invalid user compras from 173.249.47.246 port 45314
...
2020-05-09 00:24:38
85.93.57.53 attackspam
May  8 13:15:52 ip-172-31-61-156 sshd[3789]: Invalid user milling from 85.93.57.53
May  8 13:15:54 ip-172-31-61-156 sshd[3789]: Failed password for invalid user milling from 85.93.57.53 port 34072 ssh2
May  8 13:15:52 ip-172-31-61-156 sshd[3789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.93.57.53
May  8 13:15:52 ip-172-31-61-156 sshd[3789]: Invalid user milling from 85.93.57.53
May  8 13:15:54 ip-172-31-61-156 sshd[3789]: Failed password for invalid user milling from 85.93.57.53 port 34072 ssh2
...
2020-05-09 00:52:02
185.216.140.252 attackbotsspam
[MK-Root1] Blocked by UFW
2020-05-09 00:44:15
107.170.254.146 attackspam
sshd: Failed password for root from 107.170.254.146 port 46666 ssh2
2020-05-09 00:39:50
14.249.125.10 attackspambots
1588939950 - 05/08/2020 14:12:30 Host: 14.249.125.10/14.249.125.10 Port: 445 TCP Blocked
2020-05-09 00:16:01
207.248.127.161 attackbotsspam
May  8 09:12:33 vps46666688 sshd[28032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.248.127.161
May  8 09:12:34 vps46666688 sshd[28032]: Failed password for invalid user farshid from 207.248.127.161 port 55814 ssh2
...
2020-05-09 00:10:14
51.75.66.142 attack
May  8 16:14:10 ns3164893 sshd[27042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
May  8 16:14:12 ns3164893 sshd[27042]: Failed password for invalid user faris from 51.75.66.142 port 53038 ssh2
...
2020-05-09 00:03:20
159.89.145.59 attack
2020-05-08T08:12:30.086476mail.thespaminator.com sshd[17883]: Invalid user admin from 159.89.145.59 port 56466
2020-05-08T08:12:32.530241mail.thespaminator.com sshd[17883]: Failed password for invalid user admin from 159.89.145.59 port 56466 ssh2
...
2020-05-09 00:11:16

Recently Reported IPs

249.192.3.236 64.46.165.21 208.164.89.41 208.210.203.64
213.57.120.186 59.70.50.46 219.77.239.106 46.86.71.231
130.177.83.162 23.203.97.27 50.233.44.195 143.210.134.0
64.104.244.46 179.93.87.29 204.250.129.145 179.24.145.80
228.44.190.189 30.60.241.119 157.19.28.75 187.223.198.247