Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Irvine

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.52.3.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.52.3.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 15:20:39 CST 2025
;; MSG SIZE  rcvd: 104
Host info
14.3.52.136.in-addr.arpa domain name pointer 136-52-3-14.googlefiber.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.3.52.136.in-addr.arpa	name = 136-52-3-14.googlefiber.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.98.37.25 attackbotsspam
Nov 23 20:44:46 MK-Soft-VM8 sshd[26165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.37.25 
Nov 23 20:44:47 MK-Soft-VM8 sshd[26165]: Failed password for invalid user rpm from 222.98.37.25 port 52293 ssh2
...
2019-11-24 05:06:16
122.104.96.227 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-24 05:36:44
62.89.15.108 attack
Hits on port : 445
2019-11-24 05:12:24
34.73.254.71 attackspambots
Automatic report - Banned IP Access
2019-11-24 05:08:24
122.51.23.52 attackbots
F2B jail: sshd. Time: 2019-11-23 17:15:44, Reported by: VKReport
2019-11-24 05:25:23
213.231.27.248 attackspam
Hits on port : 5500
2019-11-24 05:10:16
175.211.93.29 attackspambots
Nov 23 09:18:33 Tower sshd[4682]: Connection from 175.211.93.29 port 38610 on 192.168.10.220 port 22
Nov 23 09:18:35 Tower sshd[4682]: Invalid user guest from 175.211.93.29 port 38610
Nov 23 09:18:35 Tower sshd[4682]: error: Could not get shadow information for NOUSER
Nov 23 09:18:35 Tower sshd[4682]: Failed password for invalid user guest from 175.211.93.29 port 38610 ssh2
Nov 23 09:18:35 Tower sshd[4682]: Received disconnect from 175.211.93.29 port 38610:11: Bye Bye [preauth]
Nov 23 09:18:35 Tower sshd[4682]: Disconnected from invalid user guest 175.211.93.29 port 38610 [preauth]
2019-11-24 05:14:43
124.118.185.35 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-24 05:33:16
45.118.145.164 attackspambots
Nov 23 15:00:36 localhost sshd\[119755\]: Invalid user kovacsk from 45.118.145.164 port 39028
Nov 23 15:00:36 localhost sshd\[119755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.145.164
Nov 23 15:00:38 localhost sshd\[119755\]: Failed password for invalid user kovacsk from 45.118.145.164 port 39028 ssh2
Nov 23 15:05:22 localhost sshd\[119893\]: Invalid user webmaster from 45.118.145.164 port 40904
Nov 23 15:05:22 localhost sshd\[119893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.145.164
...
2019-11-24 05:17:03
112.113.154.121 attack
badbot
2019-11-24 05:15:27
210.21.226.2 attackspambots
Nov 23 14:16:32 server sshd\[22257\]: Failed password for invalid user kali from 210.21.226.2 port 25486 ssh2
Nov 23 22:51:30 server sshd\[25257\]: Invalid user student from 210.21.226.2
Nov 23 22:51:30 server sshd\[25257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2 
Nov 23 22:51:32 server sshd\[25257\]: Failed password for invalid user student from 210.21.226.2 port 37338 ssh2
Nov 23 23:33:38 server sshd\[4223\]: Invalid user test from 210.21.226.2
Nov 23 23:33:38 server sshd\[4223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2 
...
2019-11-24 05:25:01
185.234.217.241 attack
Nov 23 19:27:10 vmi148877 sshd\[14852\]: refused connect from 185.234.217.241 \(185.234.217.241\)
Nov 23 19:27:15 vmi148877 sshd\[14860\]: refused connect from 185.234.217.241 \(185.234.217.241\)
Nov 23 19:27:20 vmi148877 sshd\[14868\]: refused connect from 185.234.217.241 \(185.234.217.241\)
Nov 23 19:27:25 vmi148877 sshd\[14876\]: refused connect from 185.234.217.241 \(185.234.217.241\)
Nov 23 19:27:30 vmi148877 sshd\[14884\]: refused connect from 185.234.217.241 \(185.234.217.241\)
2019-11-24 05:17:59
152.32.98.231 attack
23/tcp
[2019-11-23]1pkt
2019-11-24 05:21:26
123.20.171.171 attackbotsspam
Nov 23 15:13:14 mail postfix/smtpd[7135]: warning: unknown[123.20.171.171]: SASL PLAIN authentication failed: 
Nov 23 15:18:01 mail postfix/smtps/smtpd[6265]: warning: unknown[123.20.171.171]: SASL PLAIN authentication failed: 
Nov 23 15:18:10 mail postfix/smtps/smtpd[6266]: warning: unknown[123.20.171.171]: SASL PLAIN authentication failed:
2019-11-24 05:07:53
96.254.74.40 attack
3389BruteforceFW21
2019-11-24 05:23:06

Recently Reported IPs

101.33.75.60 3.48.103.44 38.224.8.231 28.121.31.124
251.225.48.214 250.163.93.68 29.199.250.19 243.4.161.132
5.173.22.226 204.187.236.159 68.7.164.248 89.76.52.173
199.102.119.87 103.212.102.164 65.195.162.163 45.159.95.6
92.184.110.201 90.243.93.185 25.215.250.123 148.210.78.167