Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.52.57.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14716
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.52.57.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 13:40:23 CST 2025
;; MSG SIZE  rcvd: 105
Host info
12.57.52.136.in-addr.arpa domain name pointer 136-52-57-12.googlefiber.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.57.52.136.in-addr.arpa	name = 136-52-57-12.googlefiber.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.86.251.8 attackspambots
2019-07-06 20:23:10 1hjpL3-00083u-Lj SMTP connection from \(\[91.86.251.8\]\) \[91.86.251.8\]:10229 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-06 20:23:23 1hjpLH-00084D-94 SMTP connection from \(\[91.86.251.8\]\) \[91.86.251.8\]:10384 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-06 20:23:29 1hjpLM-00084M-Vm SMTP connection from \(\[91.86.251.8\]\) \[91.86.251.8\]:10473 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 06:20:22
194.180.224.112 attackspambots
Unauthorized connection attempt detected from IP address 194.180.224.112 to port 23 [J]
2020-01-28 06:36:24
95.218.101.167 attackspam
5500/tcp
[2020-01-27]1pkt
2020-01-28 06:17:43
134.249.150.86 attack
Honeypot attack, port: 445, PTR: 134-249-150-86.broadband.kyivstar.net.
2020-01-28 06:25:51
92.176.140.167 attackspam
2019-02-28 17:15:23 H=\(167.pool92-176-140.dynamic.orange.es\) \[92.176.140.167\]:9525 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-28 17:15:37 H=\(167.pool92-176-140.dynamic.orange.es\) \[92.176.140.167\]:9661 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-28 17:15:49 H=\(167.pool92-176-140.dynamic.orange.es\) \[92.176.140.167\]:9764 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-28 06:06:19
106.12.43.142 attack
Unauthorized connection attempt detected from IP address 106.12.43.142 to port 2220 [J]
2020-01-28 06:08:00
91.234.128.203 attack
2019-03-11 11:28:16 1h3IAG-0004HB-F8 SMTP connection from 91-234-128-203.net.hlg.com.pl \[91.234.128.203\]:11387 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-11 11:28:52 1h3IAr-0004IB-FU SMTP connection from 91-234-128-203.net.hlg.com.pl \[91.234.128.203\]:11519 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-11 11:29:26 1h3IBO-0004Jf-Jx SMTP connection from 91-234-128-203.net.hlg.com.pl \[91.234.128.203\]:11641 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 06:46:00
83.166.192.229 attackspam
1433/tcp
[2020-01-27]1pkt
2020-01-28 06:15:46
209.200.15.177 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-28 06:12:44
42.2.252.141 attackspam
Unauthorized connection attempt detected from IP address 42.2.252.141 to port 5555 [J]
2020-01-28 06:08:38
91.250.138.195 attackspam
2019-03-01 12:32:22 H=\(\[91.250.138.195\]\) \[91.250.138.195\]:32844 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-01 12:32:34 H=\(\[91.250.138.195\]\) \[91.250.138.195\]:32990 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-01 12:32:46 H=\(\[91.250.138.195\]\) \[91.250.138.195\]:33119 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-28 06:35:24
138.197.89.186 attack
Jan 27 21:34:35 XXXXXX sshd[1710]: Invalid user admin1 from 138.197.89.186 port 32776
2020-01-28 06:43:27
196.202.15.68 attackspam
Unauthorized connection attempt detected from IP address 196.202.15.68 to port 4567 [J]
2020-01-28 06:19:17
61.178.29.191 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-28 06:45:21
183.88.74.14 attackbots
88/tcp
[2020-01-27]1pkt
2020-01-28 06:31:40

Recently Reported IPs

160.62.217.52 29.87.154.219 140.148.159.86 82.251.43.45
45.29.39.10 252.242.253.80 3.222.174.189 176.236.89.236
99.43.23.166 151.28.95.180 217.203.255.63 53.45.93.27
57.242.223.223 149.6.205.221 218.128.157.157 186.94.199.202
139.216.25.147 118.223.13.92 56.12.82.194 237.177.214.253