Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dortmund

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
109.40.1.231 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 06:04:34
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.40.1.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25314
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.40.1.252.			IN	A

;; AUTHORITY SECTION:
.			208	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020120200 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 03 02:01:13 CST 2020
;; MSG SIZE  rcvd: 116

Host info
252.1.40.109.in-addr.arpa domain name pointer ip-109-40-1-252.web.vodafone.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
252.1.40.109.in-addr.arpa	name = ip-109-40-1-252.web.vodafone.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.96.244.193 attackspam
Portscan detected
2020-09-30 04:46:49
49.234.77.247 attack
Invalid user git from 49.234.77.247 port 44686
2020-09-30 04:26:37
222.186.42.213 attackspambots
Sep 29 20:37:37 game-panel sshd[15920]: Failed password for root from 222.186.42.213 port 23967 ssh2
Sep 29 20:37:45 game-panel sshd[15922]: Failed password for root from 222.186.42.213 port 10073 ssh2
Sep 29 20:37:47 game-panel sshd[15922]: Failed password for root from 222.186.42.213 port 10073 ssh2
2020-09-30 04:41:16
51.178.52.84 attack
WordPress XMLRPC scan :: 51.178.52.84 0.004 BYPASS [29/Sep/2020:20:03:04  0000] [censored_2] "POST /xmlrpc.php HTTP/2.0" 200 20 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-30 04:45:22
218.241.154.197 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-30 04:36:52
185.216.140.31 attackbots
 TCP (SYN) 185.216.140.31:45987 -> port 3056, len 44
2020-09-30 04:50:24
109.248.226.147 attackspambots
20/9/28@16:40:30: FAIL: Alarm-Network address from=109.248.226.147
...
2020-09-30 04:35:33
103.215.53.52 attackbots
firewall-block, port(s): 2323/tcp
2020-09-30 04:54:44
106.3.130.99 attack
SSH Honeypot -> SSH Bruteforce / Login
2020-09-30 04:32:21
186.42.182.41 attack
firewall-block, port(s): 445/tcp
2020-09-30 04:47:29
104.131.84.225 attackspambots
20 attempts against mh-ssh on cloud
2020-09-30 04:42:26
200.170.250.54 attackspam
Invalid user monitoring from 200.170.250.54 port 60844
2020-09-30 04:39:57
121.123.148.220 attackbots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-30 04:52:51
103.18.242.34 attackspam
$f2bV_matches
2020-09-30 04:53:49
62.112.11.81 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-29T16:08:37Z and 2020-09-29T16:44:41Z
2020-09-30 04:28:41

Recently Reported IPs

91.90.122.143 213.14.193.163 213.14.193.161 35.214.148.190
108.207.139.59 188.180.80.114 88.180.80.114 46.114.2.188
106.204.192.222 52.152.144.119 47.15.55.144 104.237.145.53
62.171.131.212 164.68.111.116 193.239.234.199 181.214.99.149
86.144.67.255 78.160.95.181 31.206.101.209 46.155.1.119