Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Khergam

Region: Gujarat

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
122.252.239.167 spambotsattackproxynormal
122.252.239.167
2021-10-17 21:46:52
122.252.239.167 spambotsattackproxynormal
122.252.239.167
2021-10-17 21:46:32
122.252.239.167 spambotsattackproxynormal
122.252.239.167
2021-10-17 21:46:24
122.252.239.167 spambotsattackproxynormal
122.252.239.167
2021-10-17 21:45:55
122.252.239.5 attack
Repeated brute force against a port
2020-10-10 04:24:18
122.252.239.5 attackbots
2020-10-09T15:00:24.888338paragon sshd[791574]: Failed password for invalid user rpm from 122.252.239.5 port 45906 ssh2
2020-10-09T15:04:44.725484paragon sshd[791650]: Invalid user ghost4 from 122.252.239.5 port 50138
2020-10-09T15:04:44.729385paragon sshd[791650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5
2020-10-09T15:04:44.725484paragon sshd[791650]: Invalid user ghost4 from 122.252.239.5 port 50138
2020-10-09T15:04:46.438154paragon sshd[791650]: Failed password for invalid user ghost4 from 122.252.239.5 port 50138 ssh2
...
2020-10-09 20:22:07
122.252.239.5 attackbotsspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-10-09 12:09:40
122.252.239.5 attackbots
$f2bV_matches
2020-09-23 20:59:40
122.252.239.5 attackspambots
Sep 22 22:25:39 * sshd[12526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5
Sep 22 22:25:42 * sshd[12526]: Failed password for invalid user frappe from 122.252.239.5 port 44364 ssh2
2020-09-23 05:07:39
122.252.239.5 attackspam
Aug 30 16:00:21 electroncash sshd[33527]: Failed password for invalid user zyc from 122.252.239.5 port 40904 ssh2
Aug 30 16:05:17 electroncash sshd[36095]: Invalid user cop from 122.252.239.5 port 45210
Aug 30 16:05:17 electroncash sshd[36095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5 
Aug 30 16:05:17 electroncash sshd[36095]: Invalid user cop from 122.252.239.5 port 45210
Aug 30 16:05:18 electroncash sshd[36095]: Failed password for invalid user cop from 122.252.239.5 port 45210 ssh2
...
2020-08-31 01:22:00
122.252.239.5 attack
Aug 24 16:17:50 sachi sshd\[16491\]: Failed password for invalid user yanglin from 122.252.239.5 port 42834 ssh2
Aug 24 16:20:43 sachi sshd\[18263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5  user=root
Aug 24 16:20:44 sachi sshd\[18263\]: Failed password for root from 122.252.239.5 port 48178 ssh2
Aug 24 16:23:43 sachi sshd\[20092\]: Invalid user zyy from 122.252.239.5
Aug 24 16:23:43 sachi sshd\[20092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5
2020-08-25 14:04:33
122.252.239.5 attackbotsspam
Aug 22 18:06:42 l02a sshd[936]: Invalid user swapnil from 122.252.239.5
Aug 22 18:06:42 l02a sshd[936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5 
Aug 22 18:06:42 l02a sshd[936]: Invalid user swapnil from 122.252.239.5
Aug 22 18:06:44 l02a sshd[936]: Failed password for invalid user swapnil from 122.252.239.5 port 38060 ssh2
2020-08-23 03:52:09
122.252.239.5 attackspambots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-17 01:22:08
122.252.239.5 attackbotsspam
Aug 10 21:30:33 gospond sshd[21095]: Failed password for root from 122.252.239.5 port 51554 ssh2
Aug 10 21:30:32 gospond sshd[21095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5  user=root
Aug 10 21:30:33 gospond sshd[21095]: Failed password for root from 122.252.239.5 port 51554 ssh2
...
2020-08-11 05:59:59
122.252.239.5 attackspambots
DATE:2020-08-09 21:49:27,IP:122.252.239.5,MATCHES:10,PORT:ssh
2020-08-10 03:58:53
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.252.239.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.252.239.39.			IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020110300 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 100.100.2.138#53(100.100.2.138)
;; WHEN: Tue Nov 03 18:27:49 CST 2020
;; MSG SIZE  rcvd: 118

Host info
39.239.252.122.in-addr.arpa domain name pointer ws39-239-252-122.rcil.gov.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.239.252.122.in-addr.arpa	name = ws39-239-252-122.rcil.gov.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.95.39.46 attackspambots
Automatic report - CMS Brute-Force Attack
2019-07-02 08:18:38
223.171.42.178 attack
SSH invalid-user multiple login try
2019-07-02 07:56:25
165.22.93.91 attackbots
SSH/22 MH Probe, BF, Hack -
2019-07-02 08:00:56
211.198.49.236 attack
Trying to deliver email spam, but blocked by RBL
2019-07-02 08:36:17
118.41.132.101 attackspambots
Jul  1 22:15:14 pi01 sshd[27132]: Connection from 118.41.132.101 port 50580 on 192.168.1.10 port 22
Jul  1 22:15:15 pi01 sshd[27132]: Invalid user changeme from 118.41.132.101 port 50580
Jul  1 22:15:15 pi01 sshd[27132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.132.101
Jul  1 22:15:17 pi01 sshd[27132]: Failed password for invalid user changeme from 118.41.132.101 port 50580 ssh2
Jul  1 22:15:17 pi01 sshd[27132]: Connection closed by 118.41.132.101 port 50580 [preauth]
Jul  1 22:51:40 pi01 sshd[28159]: Connection from 118.41.132.101 port 59892 on 192.168.1.10 port 22
Jul  1 22:51:41 pi01 sshd[28159]: Invalid user admin from 118.41.132.101 port 59892
Jul  1 22:51:42 pi01 sshd[28159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.132.101
Jul  1 22:51:44 pi01 sshd[28159]: Failed password for invalid user admin from 118.41.132.101 port 59892 ssh2
Jul  1 22:51:44 pi01 sshd[2........
-------------------------------
2019-07-02 08:22:05
117.50.73.241 attack
Jul  2 02:09:00 srv-4 sshd\[9212\]: Invalid user cisco from 117.50.73.241
Jul  2 02:09:00 srv-4 sshd\[9212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.73.241
Jul  2 02:09:02 srv-4 sshd\[9212\]: Failed password for invalid user cisco from 117.50.73.241 port 44648 ssh2
...
2019-07-02 08:17:30
193.188.22.12 attackspambots
" "
2019-07-02 08:34:00
217.31.39.82 attack
NAME : SK-DSIDATA-BROADBAND-INTERNET-ACCESS CIDR : 217.31.39.0/24 DDoS attack Slovakia (Slovak Republic) - block certain countries :) IP: 217.31.39.82  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-07-02 08:06:00
159.203.179.230 attackbots
Jul  2 01:08:54 icinga sshd[28850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.179.230
Jul  2 01:08:56 icinga sshd[28850]: Failed password for invalid user yv from 159.203.179.230 port 53164 ssh2
...
2019-07-02 08:20:28
85.139.75.31 attackbots
Trying to deliver email spam, but blocked by RBL
2019-07-02 08:13:42
178.128.27.125 attack
SSH invalid-user multiple login try
2019-07-02 07:56:10
165.227.150.158 attackspambots
$f2bV_matches
2019-07-02 08:37:14
37.139.21.75 attack
Jul  2 05:44:21 tanzim-HP-Z238-Microtower-Workstation sshd\[4269\]: Invalid user vnc from 37.139.21.75
Jul  2 05:44:21 tanzim-HP-Z238-Microtower-Workstation sshd\[4269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.21.75
Jul  2 05:44:22 tanzim-HP-Z238-Microtower-Workstation sshd\[4269\]: Failed password for invalid user vnc from 37.139.21.75 port 49074 ssh2
...
2019-07-02 08:19:33
141.98.9.2 attack
Jul  2 02:12:03 mail postfix/smtpd\[7324\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  2 02:13:05 mail postfix/smtpd\[9338\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  2 02:14:07 mail postfix/smtpd\[8150\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-02 08:25:41
52.176.110.203 attackspambots
Jul  1 23:08:02 unicornsoft sshd\[5776\]: Invalid user luc from 52.176.110.203
Jul  1 23:08:02 unicornsoft sshd\[5776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.176.110.203
Jul  1 23:08:05 unicornsoft sshd\[5776\]: Failed password for invalid user luc from 52.176.110.203 port 37564 ssh2
2019-07-02 08:38:13

Recently Reported IPs

46.6.12.162 46.6.12.160 176.96.238.45 46.6.12.109
105.247.158.88 187.190.99.251 37.24.222.58 51.79.199.131
216.246.160.147 176.105.204.114 108.188.30.187 191.193.211.57
115.55.25.139 123.11.160.189 13.72.83.139 157.230.229.242
172.58.4.14 182.57.219.42 207.154.237.181 219.155.41.40