Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Villingen-Schwenningen

Region: Baden-Württemberg Region

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.233.4.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37643
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.233.4.252.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019073002 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 31 02:40:30 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 252.4.233.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 252.4.233.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.138.208.158 attackspam
2020-04-02T01:09:35.336824jannga.de sshd[32430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.138.208.158  user=root
2020-04-02T01:09:36.833538jannga.de sshd[32430]: Failed password for root from 94.138.208.158 port 52710 ssh2
...
2020-04-02 07:22:21
111.207.167.147 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-04-02 07:33:43
120.201.250.44 attack
SSH bruteforce
2020-04-02 07:23:43
213.32.23.54 attack
Invalid user liguanjin from 213.32.23.54 port 60092
2020-04-02 07:18:02
51.75.31.33 attack
Apr  2 00:32:54 meumeu sshd[1488]: Failed password for root from 51.75.31.33 port 41436 ssh2
Apr  2 00:36:46 meumeu sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.31.33 
Apr  2 00:36:48 meumeu sshd[2064]: Failed password for invalid user dhruv from 51.75.31.33 port 52234 ssh2
...
2020-04-02 06:58:32
165.227.187.185 attackbotsspam
Apr  2 00:00:18 minden010 sshd[21567]: Failed password for root from 165.227.187.185 port 46374 ssh2
Apr  2 00:04:23 minden010 sshd[23521]: Failed password for root from 165.227.187.185 port 58338 ssh2
Apr  2 00:08:19 minden010 sshd[25921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.187.185
...
2020-04-02 07:08:16
51.83.73.115 attackspambots
Lines containing failures of 51.83.73.115
Apr  1 01:49:35 kmh-vmh-001-fsn07 sshd[30746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.73.115  user=r.r
Apr  1 01:49:37 kmh-vmh-001-fsn07 sshd[30746]: Failed password for r.r from 51.83.73.115 port 45936 ssh2
Apr  1 01:49:37 kmh-vmh-001-fsn07 sshd[30746]: Received disconnect from 51.83.73.115 port 45936:11: Bye Bye [preauth]
Apr  1 01:49:37 kmh-vmh-001-fsn07 sshd[30746]: Disconnected from authenticating user r.r 51.83.73.115 port 45936 [preauth]
Apr  1 01:55:07 kmh-vmh-001-fsn07 sshd[32258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.73.115  user=r.r
Apr  1 01:55:09 kmh-vmh-001-fsn07 sshd[32258]: Failed password for r.r from 51.83.73.115 port 59111 ssh2
Apr  1 01:55:09 kmh-vmh-001-fsn07 sshd[32258]: Received disconnect from 51.83.73.115 port 59111:11: Bye Bye [preauth]
Apr  1 01:55:09 kmh-vmh-001-fsn07 sshd[32258]: Disconnecte........
------------------------------
2020-04-02 07:12:22
103.221.252.46 attackspambots
Invalid user nkx from 103.221.252.46 port 51602
2020-04-02 07:35:04
186.214.237.232 attackspambots
Lines containing failures of 186.214.237.232
Apr  2 00:12:32 mx-in-02 sshd[4101]: Invalid user ubuntu from 186.214.237.232 port 32990
Apr  2 00:12:32 mx-in-02 sshd[4101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.214.237.232 
Apr  2 00:12:34 mx-in-02 sshd[4101]: Failed password for invalid user ubuntu from 186.214.237.232 port 32990 ssh2
Apr  2 00:12:34 mx-in-02 sshd[4101]: Received disconnect from 186.214.237.232 port 32990:11: Normal Shutdown [preauth]
Apr  2 00:12:34 mx-in-02 sshd[4101]: Disconnected from invalid user ubuntu 186.214.237.232 port 32990 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=186.214.237.232
2020-04-02 07:01:15
112.85.42.174 attackspambots
$f2bV_matches_ltvn
2020-04-02 06:52:58
198.71.231.35 attack
xmlrpc attack
2020-04-02 07:27:01
213.139.52.65 attack
Brute force attack against VPN service
2020-04-02 07:00:42
69.229.6.34 attack
Invalid user stb from 69.229.6.34 port 60952
2020-04-02 06:55:10
35.220.140.232 attackspambots
Apr  1 23:13:35 host sshd[13848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.140.220.35.bc.googleusercontent.com  user=root
Apr  1 23:13:37 host sshd[13848]: Failed password for root from 35.220.140.232 port 52248 ssh2
...
2020-04-02 07:23:14
112.85.42.178 attackspam
Apr  2 00:51:07 srv01 sshd[20809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
Apr  2 00:51:09 srv01 sshd[20809]: Failed password for root from 112.85.42.178 port 14525 ssh2
Apr  2 00:51:12 srv01 sshd[20809]: Failed password for root from 112.85.42.178 port 14525 ssh2
Apr  2 00:51:07 srv01 sshd[20809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
Apr  2 00:51:09 srv01 sshd[20809]: Failed password for root from 112.85.42.178 port 14525 ssh2
Apr  2 00:51:12 srv01 sshd[20809]: Failed password for root from 112.85.42.178 port 14525 ssh2
Apr  2 00:51:07 srv01 sshd[20809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
Apr  2 00:51:09 srv01 sshd[20809]: Failed password for root from 112.85.42.178 port 14525 ssh2
Apr  2 00:51:12 srv01 sshd[20809]: Failed password for root from 112.85.42.178 po
...
2020-04-02 06:52:02

Recently Reported IPs

39.148.178.30 251.40.145.86 231.49.187.123 145.218.238.196
15.7.139.182 94.104.207.152 164.220.193.224 172.210.182.196
120.168.82.129 204.176.242.87 75.72.87.30 113.25.43.122
78.160.124.164 22.222.249.162 140.44.16.146 104.95.166.78
14.162.215.112 42.145.166.136 2.8.150.127 181.183.140.182