Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.252.220.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.252.220.2.			IN	A

;; AUTHORITY SECTION:
.			587	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 14:50:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 2.220.252.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.220.252.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
69.229.6.42 attack
Feb 27 06:18:10  sshd[21772]: Failed password for invalid user kirinuki from 69.229.6.42 port 56950 ssh2
2020-02-27 13:26:54
90.161.220.136 attackspam
Feb 27 04:58:39 *** sshd[9676]: Invalid user cmsftp from 90.161.220.136
2020-02-27 13:44:15
103.51.44.63 attackspam
Email rejected due to spam filtering
2020-02-27 13:23:15
183.159.113.185 attackbots
Email rejected due to spam filtering
2020-02-27 13:38:02
112.3.30.49 attackbots
Feb 27 05:37:20 xxxxxxx0 sshd[27444]: Invalid user packer from 112.3.30.49 port 48946
Feb 27 05:37:20 xxxxxxx0 sshd[27444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.49
Feb 27 05:37:22 xxxxxxx0 sshd[27444]: Failed password for invalid user packer from 112.3.30.49 port 48946 ssh2
Feb 27 06:16:02 xxxxxxx0 sshd[4779]: Invalid user liyan from 112.3.30.49 port 40332
Feb 27 06:16:02 xxxxxxx0 sshd[4779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.49

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=112.3.30.49
2020-02-27 13:31:57
42.115.53.222 attackspam
Automatic report - Port Scan Attack
2020-02-27 13:51:46
222.186.30.145 attack
Feb 27 02:48:54 firewall sshd[5557]: Failed password for root from 222.186.30.145 port 44670 ssh2
Feb 27 02:48:57 firewall sshd[5557]: Failed password for root from 222.186.30.145 port 44670 ssh2
Feb 27 02:49:00 firewall sshd[5557]: Failed password for root from 222.186.30.145 port 44670 ssh2
...
2020-02-27 13:53:33
220.132.72.94 attackspambots
Feb 27 07:39:50 pkdns2 sshd\[1618\]: Invalid user chenys from 220.132.72.94Feb 27 07:39:52 pkdns2 sshd\[1618\]: Failed password for invalid user chenys from 220.132.72.94 port 33084 ssh2Feb 27 07:43:12 pkdns2 sshd\[1803\]: Invalid user fd from 220.132.72.94Feb 27 07:43:15 pkdns2 sshd\[1803\]: Failed password for invalid user fd from 220.132.72.94 port 50972 ssh2Feb 27 07:46:13 pkdns2 sshd\[1969\]: Invalid user steve from 220.132.72.94Feb 27 07:46:15 pkdns2 sshd\[1969\]: Failed password for invalid user steve from 220.132.72.94 port 40628 ssh2
...
2020-02-27 13:47:06
189.254.33.157 attackspam
Invalid user aedhu from 189.254.33.157 port 60255
2020-02-27 14:04:46
117.121.38.58 attackspambots
Feb 26 19:14:13 web1 sshd\[12568\]: Invalid user tc from 117.121.38.58
Feb 26 19:14:13 web1 sshd\[12568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.38.58
Feb 26 19:14:16 web1 sshd\[12568\]: Failed password for invalid user tc from 117.121.38.58 port 36648 ssh2
Feb 26 19:19:26 web1 sshd\[13029\]: Invalid user couch from 117.121.38.58
Feb 26 19:19:26 web1 sshd\[13029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.38.58
2020-02-27 13:21:36
202.70.66.227 attackbots
Port probing on unauthorized port 445
2020-02-27 13:35:43
92.222.92.114 attack
Feb 27 06:26:04 localhost sshd\[9619\]: Invalid user admin from 92.222.92.114 port 38516
Feb 27 06:26:04 localhost sshd\[9619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.92.114
Feb 27 06:26:06 localhost sshd\[9619\]: Failed password for invalid user admin from 92.222.92.114 port 38516 ssh2
2020-02-27 13:31:33
42.118.38.73 attack
1582779538 - 02/27/2020 05:58:58 Host: 42.118.38.73/42.118.38.73 Port: 445 TCP Blocked
2020-02-27 13:30:09
150.242.172.80 attack
Email rejected due to spam filtering
2020-02-27 13:50:11
218.92.0.175 attack
SSH auth scanning - multiple failed logins
2020-02-27 13:43:18

Recently Reported IPs

117.252.220.225 117.252.220.203 117.252.220.216 117.252.220.231
117.252.220.238 117.252.220.242 117.252.220.244 117.252.220.249
117.252.220.252 117.252.220.45 117.252.220.42 117.252.220.40
117.252.220.34 109.106.250.43 117.252.220.47 117.252.220.6
117.252.220.37 117.252.220.62 117.252.220.5 117.252.220.56