Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.252.65.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47193
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.252.65.140.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 05:35:44 CST 2022
;; MSG SIZE  rcvd: 107
Host info
140.65.252.109.in-addr.arpa domain name pointer 109-252-65-140.nat.spd-mgts.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.65.252.109.in-addr.arpa	name = 109-252-65-140.nat.spd-mgts.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
105.228.226.5 attackspam
2019-10-21 x@x
2019-10-21 21:35:32 unexpected disconnection while reading SMTP command from (105-228-226-5.ti-dsl.telkomsa.net) [105.228.226.5]:48691 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=105.228.226.5
2019-10-22 05:03:38
27.37.244.243 attackspam
Seq 2995002506
2019-10-22 05:00:45
194.25.134.18 attack
An email scam was received from originating IP 194.25.134.18 attempting to have receiver declared deceased, attempting to declare themselves heir to an investment fund as beneficiary, and attempting to have said fund (unknown to me) deposited in a "Texas Champion Bank" :Name of Bank: TEXAS CHAMPION BANK
Bank Address: 6124 S. Staples, Corpus Christi, Texas 78413 U.S.A.
Routing Number: 114914723
Account Number: 909009245
Account Name: Lawrence R. Larson
Account Address: 7251 Grove Road, Apt. 160, Brooksville, Florida 34613 U.S.=  Signed by a Paul Douglas, joade022@gmail.com
2019-10-22 05:04:42
58.87.92.153 attack
Oct 21 16:16:36 xtremcommunity sshd\[754584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.92.153  user=root
Oct 21 16:16:38 xtremcommunity sshd\[754584\]: Failed password for root from 58.87.92.153 port 48856 ssh2
Oct 21 16:20:17 xtremcommunity sshd\[754698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.92.153  user=root
Oct 21 16:20:19 xtremcommunity sshd\[754698\]: Failed password for root from 58.87.92.153 port 55994 ssh2
Oct 21 16:23:58 xtremcommunity sshd\[754800\]: Invalid user abcd from 58.87.92.153 port 34888
Oct 21 16:23:58 xtremcommunity sshd\[754800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.92.153
...
2019-10-22 04:48:38
193.201.224.12 attack
Oct 21 20:03:50 freedom sshd\[9722\]: Invalid user 0 from 193.201.224.12 port 53314
Oct 21 20:04:15 freedom sshd\[9726\]: Invalid user 22 from 193.201.224.12 port 31828
Oct 21 20:04:16 freedom sshd\[9729\]: Invalid user 101 from 193.201.224.12 port 53475
Oct 21 20:05:34 freedom sshd\[9737\]: Invalid user 123 from 193.201.224.12 port 38268
Oct 21 20:05:35 freedom sshd\[9740\]: Invalid user 1111 from 193.201.224.12 port 39325
...
2019-10-22 05:17:51
180.168.198.142 attackbotsspam
Oct 21 22:22:15 srv206 sshd[12478]: Invalid user monitor from 180.168.198.142
Oct 21 22:22:15 srv206 sshd[12478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.198.142
Oct 21 22:22:15 srv206 sshd[12478]: Invalid user monitor from 180.168.198.142
Oct 21 22:22:16 srv206 sshd[12478]: Failed password for invalid user monitor from 180.168.198.142 port 32958 ssh2
...
2019-10-22 05:15:57
92.118.161.21 attackspambots
Automatic report - Port Scan Attack
2019-10-22 05:20:08
60.168.75.49 attackbots
Seq 2995002506
2019-10-22 04:45:53
160.119.181.92 attack
2019-10-21 x@x
2019-10-21 20:00:33 unexpected disconnection while reading SMTP command from ([160.119.181.92]) [160.119.181.92]:30150 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=160.119.181.92
2019-10-22 05:16:12
27.43.169.107 attackbotsspam
Seq 2995002506
2019-10-22 04:52:19
60.187.115.197 attackspam
Seq 2995002506
2019-10-22 04:45:37
39.73.204.122 attack
Seq 2995002506
2019-10-22 04:59:40
14.126.12.163 attackbotsspam
Seq 2995002506
2019-10-22 04:53:39
27.42.142.252 attackspambots
Seq 2995002506
2019-10-22 04:52:45
42.6.145.222 attackbotsspam
Seq 2995002506
2019-10-22 04:50:59

Recently Reported IPs

109.252.175.236 109.36.148.99 109.252.159.141 109.252.45.49
109.26.154.138 109.255.172.248 109.49.159.48 109.49.38.160
109.49.23.199 109.50.139.180 109.50.157.117 109.50.216.41
109.51.31.235 109.50.210.94 109.56.38.91 109.60.46.86
109.61.215.120 109.62.207.137 109.62.242.115 109.62.219.250