Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chanda

Region: Maharashtra

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
122.252.239.167 spambotsattackproxynormal
122.252.239.167
2021-10-17 21:46:52
122.252.239.167 spambotsattackproxynormal
122.252.239.167
2021-10-17 21:46:32
122.252.239.167 spambotsattackproxynormal
122.252.239.167
2021-10-17 21:46:24
122.252.239.167 spambotsattackproxynormal
122.252.239.167
2021-10-17 21:45:55
122.252.239.5 attack
Repeated brute force against a port
2020-10-10 04:24:18
122.252.239.5 attackbots
2020-10-09T15:00:24.888338paragon sshd[791574]: Failed password for invalid user rpm from 122.252.239.5 port 45906 ssh2
2020-10-09T15:04:44.725484paragon sshd[791650]: Invalid user ghost4 from 122.252.239.5 port 50138
2020-10-09T15:04:44.729385paragon sshd[791650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5
2020-10-09T15:04:44.725484paragon sshd[791650]: Invalid user ghost4 from 122.252.239.5 port 50138
2020-10-09T15:04:46.438154paragon sshd[791650]: Failed password for invalid user ghost4 from 122.252.239.5 port 50138 ssh2
...
2020-10-09 20:22:07
122.252.239.5 attackbotsspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-10-09 12:09:40
122.252.239.5 attackbots
$f2bV_matches
2020-09-23 20:59:40
122.252.239.5 attackspambots
Sep 22 22:25:39 * sshd[12526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5
Sep 22 22:25:42 * sshd[12526]: Failed password for invalid user frappe from 122.252.239.5 port 44364 ssh2
2020-09-23 05:07:39
122.252.239.5 attackspam
Aug 30 16:00:21 electroncash sshd[33527]: Failed password for invalid user zyc from 122.252.239.5 port 40904 ssh2
Aug 30 16:05:17 electroncash sshd[36095]: Invalid user cop from 122.252.239.5 port 45210
Aug 30 16:05:17 electroncash sshd[36095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5 
Aug 30 16:05:17 electroncash sshd[36095]: Invalid user cop from 122.252.239.5 port 45210
Aug 30 16:05:18 electroncash sshd[36095]: Failed password for invalid user cop from 122.252.239.5 port 45210 ssh2
...
2020-08-31 01:22:00
122.252.239.5 attack
Aug 24 16:17:50 sachi sshd\[16491\]: Failed password for invalid user yanglin from 122.252.239.5 port 42834 ssh2
Aug 24 16:20:43 sachi sshd\[18263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5  user=root
Aug 24 16:20:44 sachi sshd\[18263\]: Failed password for root from 122.252.239.5 port 48178 ssh2
Aug 24 16:23:43 sachi sshd\[20092\]: Invalid user zyy from 122.252.239.5
Aug 24 16:23:43 sachi sshd\[20092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5
2020-08-25 14:04:33
122.252.239.5 attackbotsspam
Aug 22 18:06:42 l02a sshd[936]: Invalid user swapnil from 122.252.239.5
Aug 22 18:06:42 l02a sshd[936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5 
Aug 22 18:06:42 l02a sshd[936]: Invalid user swapnil from 122.252.239.5
Aug 22 18:06:44 l02a sshd[936]: Failed password for invalid user swapnil from 122.252.239.5 port 38060 ssh2
2020-08-23 03:52:09
122.252.239.5 attackspambots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-17 01:22:08
122.252.239.5 attackbotsspam
Aug 10 21:30:33 gospond sshd[21095]: Failed password for root from 122.252.239.5 port 51554 ssh2
Aug 10 21:30:32 gospond sshd[21095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5  user=root
Aug 10 21:30:33 gospond sshd[21095]: Failed password for root from 122.252.239.5 port 51554 ssh2
...
2020-08-11 05:59:59
122.252.239.5 attackspambots
DATE:2020-08-09 21:49:27,IP:122.252.239.5,MATCHES:10,PORT:ssh
2020-08-10 03:58:53
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.252.239.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.252.239.197.		IN	A

;; AUTHORITY SECTION:
.			145	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021081201 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 13 01:27:16 CST 2021
;; MSG SIZE  rcvd: 108
Host info
b'197.239.252.122.in-addr.arpa domain name pointer ws197-239-252-122.rcil.gov.in.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.239.252.122.in-addr.arpa	name = ws197-239-252-122.rcil.gov.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.214.52.21 attack
Unauthorized connection attempt detected from IP address 95.214.52.21 to port 23
2020-05-13 03:29:22
213.6.227.18 attackspambots
Unauthorized connection attempt detected from IP address 213.6.227.18 to port 8080
2020-05-13 03:47:25
168.197.159.188 attack
Unauthorized connection attempt detected from IP address 168.197.159.188 to port 8080
2020-05-13 04:01:19
185.227.239.2 attackspam
Unauthorized connection attempt detected from IP address 185.227.239.2 to port 1433
2020-05-13 03:57:32
179.100.44.92 attackspam
Unauthorized connection attempt detected from IP address 179.100.44.92 to port 81
2020-05-13 04:00:23
120.221.147.62 attackbots
Connection by 120.221.147.62 on port: 23 got caught by honeypot at 5/12/2020 7:24:24 PM
2020-05-13 03:25:42
162.158.187.110 attackbotsspam
$f2bV_matches
2020-05-13 03:21:37
168.227.158.146 attackbotsspam
Unauthorized connection attempt detected from IP address 168.227.158.146 to port 445
2020-05-13 03:21:07
156.204.55.43 attackspam
Unauthorized connection attempt detected from IP address 156.204.55.43 to port 23
2020-05-13 04:02:08
222.100.155.93 attack
Attempted connection to port 80.
2020-05-13 03:46:20
132.248.110.203 attack
Unauthorized connection attempt detected from IP address 132.248.110.203 to port 4567
2020-05-13 03:23:35
205.157.159.55 attack
Unauthorized connection attempt detected from IP address 205.157.159.55 to port 80
2020-05-13 03:48:17
200.39.241.79 attack
Unauthorized connection attempt detected from IP address 200.39.241.79 to port 23
2020-05-13 03:50:54
93.51.28.228 attack
Unauthorized connection attempt detected from IP address 93.51.28.228 to port 9000
2020-05-13 03:30:37
200.162.228.80 attackbotsspam
Unauthorized connection attempt detected from IP address 200.162.228.80 to port 23
2020-05-13 03:49:33

Recently Reported IPs

45.11.225.25 45.11.227.250 179.175.186.118 23.54.20.47
5.173.144.33 5.173.145.26 62.172.32.227 213.205.197.28
89.115.206.70 89.115.206.221 85.221.148.187 174.45.67.40
194.62.43.86 61.9.110.62 185.191.34.215 37.0.11.57
195.20.240.196 39.101.194.111 200.9.155.57 200.9.155.59