Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.132.52.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27873
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.132.52.2.			IN	A

;; AUTHORITY SECTION:
.			272	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031102 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 11:56:39 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 2.52.132.120.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.52.132.120.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.171.163.129 attackbots
[MK-VM4] Blocked by UFW
2020-07-07 07:42:48
194.228.228.67 attackspam
Unauthorized connection attempt from IP address 194.228.228.67 on Port 445(SMB)
2020-07-07 07:39:11
201.139.231.226 attackspambots
Unauthorized connection attempt from IP address 201.139.231.226 on Port 445(SMB)
2020-07-07 07:14:50
203.45.116.61 attackspambots
Zyxel Multiple Products Command Injection Vulnerability
2020-07-07 07:38:56
194.152.206.12 attack
Jul  6 23:35:59 srv-ubuntu-dev3 sshd[82024]: Invalid user wanda from 194.152.206.12
Jul  6 23:35:59 srv-ubuntu-dev3 sshd[82024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.12
Jul  6 23:35:59 srv-ubuntu-dev3 sshd[82024]: Invalid user wanda from 194.152.206.12
Jul  6 23:36:01 srv-ubuntu-dev3 sshd[82024]: Failed password for invalid user wanda from 194.152.206.12 port 38324 ssh2
Jul  6 23:39:11 srv-ubuntu-dev3 sshd[82564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.12  user=root
Jul  6 23:39:13 srv-ubuntu-dev3 sshd[82564]: Failed password for root from 194.152.206.12 port 36552 ssh2
Jul  6 23:42:22 srv-ubuntu-dev3 sshd[83111]: Invalid user josh from 194.152.206.12
Jul  6 23:42:22 srv-ubuntu-dev3 sshd[83111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.12
Jul  6 23:42:22 srv-ubuntu-dev3 sshd[83111]: Invalid user josh from 
...
2020-07-07 07:08:58
62.240.25.34 attackbots
62.240.25.34 - - [06/Jul/2020:22:38:41 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
62.240.25.34 - - [06/Jul/2020:22:38:42 +0100] "POST /wp-login.php HTTP/1.1" 200 5808 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
62.240.25.34 - - [06/Jul/2020:22:43:01 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-07-07 07:33:37
45.127.59.61 attack
Unauthorized connection attempt from IP address 45.127.59.61 on Port 445(SMB)
2020-07-07 07:12:36
73.26.142.135 attackspambots
Jul  7 00:00:54 site2 sshd\[2844\]: Invalid user admin from 73.26.142.135Jul  7 00:00:56 site2 sshd\[2844\]: Failed password for invalid user admin from 73.26.142.135 port 33943 ssh2Jul  7 00:01:00 site2 sshd\[2846\]: Failed password for root from 73.26.142.135 port 34141 ssh2Jul  7 00:01:01 site2 sshd\[2848\]: Invalid user admin from 73.26.142.135Jul  7 00:01:03 site2 sshd\[2848\]: Failed password for invalid user admin from 73.26.142.135 port 33348 ssh2
...
2020-07-07 07:23:26
113.23.42.158 attack
Unauthorized connection attempt from IP address 113.23.42.158 on Port 445(SMB)
2020-07-07 07:27:12
190.37.204.127 attackbotsspam
Unauthorized connection attempt from IP address 190.37.204.127 on Port 445(SMB)
2020-07-07 07:18:57
218.92.0.224 attackbots
Jul  7 04:17:03 gw1 sshd[6759]: Failed password for root from 218.92.0.224 port 32366 ssh2
Jul  7 04:17:16 gw1 sshd[6759]: error: maximum authentication attempts exceeded for root from 218.92.0.224 port 32366 ssh2 [preauth]
...
2020-07-07 07:20:28
87.251.74.18 attackspam
[portscan] Port scan
2020-07-07 07:34:55
222.186.15.158 attackbots
Jul  6 19:28:55 NPSTNNYC01T sshd[19189]: Failed password for root from 222.186.15.158 port 15108 ssh2
Jul  6 19:29:03 NPSTNNYC01T sshd[19229]: Failed password for root from 222.186.15.158 port 48043 ssh2
Jul  6 19:29:05 NPSTNNYC01T sshd[19229]: Failed password for root from 222.186.15.158 port 48043 ssh2
...
2020-07-07 07:30:12
83.97.20.31 attackbots
Brute force attack stopped by firewall
2020-07-07 07:29:46
52.15.91.104 attackbots
2020-07-06T22:57:28.391313galaxy.wi.uni-potsdam.de sshd[31046]: Invalid user computer from 52.15.91.104 port 41882
2020-07-06T22:57:28.393516galaxy.wi.uni-potsdam.de sshd[31046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-15-91-104.us-east-2.compute.amazonaws.com
2020-07-06T22:57:28.391313galaxy.wi.uni-potsdam.de sshd[31046]: Invalid user computer from 52.15.91.104 port 41882
2020-07-06T22:57:29.973897galaxy.wi.uni-potsdam.de sshd[31046]: Failed password for invalid user computer from 52.15.91.104 port 41882 ssh2
2020-07-06T23:00:43.569355galaxy.wi.uni-potsdam.de sshd[31394]: Invalid user admin from 52.15.91.104 port 42180
2020-07-06T23:00:43.571752galaxy.wi.uni-potsdam.de sshd[31394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-15-91-104.us-east-2.compute.amazonaws.com
2020-07-06T23:00:43.569355galaxy.wi.uni-potsdam.de sshd[31394]: Invalid user admin from 52.15.91.104 port 42180
2020
...
2020-07-07 07:43:10

Recently Reported IPs

120.132.52.192 120.132.52.20 120.132.52.22 120.132.52.224
120.132.52.24 120.132.52.240 120.132.52.248 120.132.52.252
120.132.52.254 120.132.52.26 120.132.52.28 120.132.52.32
120.132.52.34 120.132.52.4 122.57.1.234 120.147.200.154
120.15.71.138 120.151.214.31 120.151.219.158 120.151.228.244