Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.152.52.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;135.152.52.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 13:24:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
164.52.152.135.in-addr.arpa domain name pointer nothing.attdns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.52.152.135.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.41.11.34 attack
SSH invalid-user multiple login try
2019-10-28 16:47:42
185.175.93.18 attackspambots
10/28/2019-09:54:02.796314 185.175.93.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-28 16:57:07
27.193.190.175 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-28 16:52:22
68.183.91.25 attackbotsspam
Oct 27 18:02:42 php1 sshd\[3464\]: Invalid user rpms from 68.183.91.25
Oct 27 18:02:42 php1 sshd\[3464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.91.25
Oct 27 18:02:44 php1 sshd\[3464\]: Failed password for invalid user rpms from 68.183.91.25 port 40743 ssh2
Oct 27 18:07:09 php1 sshd\[4294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.91.25  user=root
Oct 27 18:07:11 php1 sshd\[4294\]: Failed password for root from 68.183.91.25 port 59973 ssh2
2019-10-28 16:50:25
91.188.193.150 attackbots
slow and persistent scanner
2019-10-28 17:00:00
95.179.212.17 attack
SSH/22 MH Probe, BF, Hack -
2019-10-28 17:01:33
165.22.231.238 attack
Automatic report - SSH Brute-Force Attack
2019-10-28 17:12:11
176.10.99.200 attackbots
fail2ban honeypot
2019-10-28 16:40:03
106.246.178.215 attackbotsspam
BURG,WP GET /wp-login.php
2019-10-28 16:52:56
118.89.27.248 attackbotsspam
2019-10-20T00:36:58.593468ns525875 sshd\[14280\]: Invalid user master3 from 118.89.27.248 port 52640
2019-10-20T00:36:58.599615ns525875 sshd\[14280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.27.248
2019-10-20T00:37:00.561078ns525875 sshd\[14280\]: Failed password for invalid user master3 from 118.89.27.248 port 52640 ssh2
2019-10-20T00:42:29.568840ns525875 sshd\[21212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.27.248  user=root
2019-10-20T00:53:12.444162ns525875 sshd\[1941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.27.248  user=root
2019-10-20T00:53:14.119169ns525875 sshd\[1941\]: Failed password for root from 118.89.27.248 port 55844 ssh2
2019-10-20T00:58:34.585142ns525875 sshd\[8516\]: Invalid user admin from 118.89.27.248 port 37968
2019-10-20T00:58:34.591857ns525875 sshd\[8516\]: pam_unix\(sshd:auth\): authenti
...
2019-10-28 16:38:29
103.105.142.132 attackbots
Automatic report - XMLRPC Attack
2019-10-28 17:03:09
157.55.39.228 attackspam
Automatic report - Banned IP Access
2019-10-28 16:37:42
198.108.67.46 attackbots
Port scan: Attack repeated for 24 hours
2019-10-28 16:45:07
163.172.26.143 attackbotsspam
Oct 28 03:49:01 ny01 sshd[602]: Failed password for root from 163.172.26.143 port 35114 ssh2
Oct 28 03:52:19 ny01 sshd[905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.26.143
Oct 28 03:52:21 ny01 sshd[905]: Failed password for invalid user alegre from 163.172.26.143 port 9130 ssh2
2019-10-28 16:54:45
157.245.166.183 attackspam
Wordpress bruteforce
2019-10-28 16:44:01

Recently Reported IPs

181.246.2.13 88.23.80.196 169.22.91.144 154.115.90.239
206.159.248.12 155.49.139.1 179.86.164.87 225.149.63.120
9.235.5.229 89.157.220.89 171.222.104.143 252.251.221.222
33.163.92.252 74.33.192.156 28.247.199.149 232.42.118.200
51.87.113.22 235.194.197.19 19.78.73.178 42.192.85.110