Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: No.31,Jin-rong Street

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
140.240.213.153 attack
Unauthorized connection attempt detected from IP address 140.240.213.153 to port 23 [J]
2020-01-13 18:39:15
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.240.213.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46458
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.240.213.252.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 08 23:49:59 +08 2019
;; MSG SIZE  rcvd: 119

Host info
Host 252.213.240.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 252.213.240.140.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
197.254.62.14 attack
proto=tcp  .  spt=55175  .  dpt=25  .     (listed on Blocklist de  Aug 09)     (513)
2019-08-11 02:51:36
1.215.122.108 attackspam
proto=tcp  .  spt=41539  .  dpt=25  .     (listed on     Github Combined on 3 lists )     (519)
2019-08-11 02:38:59
5.181.108.220 attackbots
Multiple SSH auth failures recorded by fail2ban
2019-08-11 03:00:09
164.163.2.4 attack
SSH Brute-Force attacks
2019-08-11 03:04:15
185.176.27.118 attackbots
firewall-block, port(s): 3499/tcp, 5583/tcp, 13045/tcp, 25090/tcp, 33391/tcp, 33893/tcp, 53004/tcp
2019-08-11 03:26:49
185.176.27.86 attackspam
2 attempts last 24 Hours
2019-08-11 02:52:33
185.176.27.162 attackspambots
08/10/2019-15:09:03.833365 185.176.27.162 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-11 03:21:45
94.102.49.64 attackbots
Aug 10 13:29:36 aat-srv002 sshd[15986]: Failed password for root from 94.102.49.64 port 56278 ssh2
Aug 10 13:33:50 aat-srv002 sshd[16065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.102.49.64
Aug 10 13:33:51 aat-srv002 sshd[16065]: Failed password for invalid user db2inst1 from 94.102.49.64 port 51922 ssh2
...
2019-08-11 02:50:35
149.56.44.101 attackbotsspam
Aug 10 17:30:53 v22019058497090703 sshd[32174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.101
Aug 10 17:30:55 v22019058497090703 sshd[32174]: Failed password for invalid user shirley from 149.56.44.101 port 45566 ssh2
Aug 10 17:35:25 v22019058497090703 sshd[32507]: Failed password for root from 149.56.44.101 port 40340 ssh2
...
2019-08-11 03:06:00
190.52.193.90 attackbotsspam
proto=tcp  .  spt=44922  .  dpt=25  .     (listed on     Github Combined on 3 lists )     (514)
2019-08-11 02:49:47
192.99.70.12 attack
Feb 24 16:31:45 motanud sshd\[25472\]: Invalid user sanjeev from 192.99.70.12 port 53252
Feb 24 16:31:45 motanud sshd\[25472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.12
Feb 24 16:31:48 motanud sshd\[25472\]: Failed password for invalid user sanjeev from 192.99.70.12 port 53252 ssh2
2019-08-11 03:22:15
206.189.185.202 attack
Aug 10 16:17:00 ip-172-31-62-245 sshd\[7145\]: Invalid user zxin10 from 206.189.185.202\
Aug 10 16:17:02 ip-172-31-62-245 sshd\[7145\]: Failed password for invalid user zxin10 from 206.189.185.202 port 58112 ssh2\
Aug 10 16:21:21 ip-172-31-62-245 sshd\[7156\]: Invalid user a11-updater from 206.189.185.202\
Aug 10 16:21:23 ip-172-31-62-245 sshd\[7156\]: Failed password for invalid user a11-updater from 206.189.185.202 port 53124 ssh2\
Aug 10 16:25:40 ip-172-31-62-245 sshd\[7182\]: Invalid user kkw from 206.189.185.202\
2019-08-11 03:00:36
114.106.150.103 attackbotsspam
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x
2019-08-10 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.106.150.103
2019-08-11 03:22:36
92.53.65.128 attack
firewall-block, port(s): 10012/tcp
2019-08-11 03:17:36
200.39.236.99 attack
Automatic report - Port Scan Attack
2019-08-11 03:17:56

Recently Reported IPs

191.253.104.126 85.23.99.250 70.35.201.155 160.130.27.149
95.85.80.19 95.85.68.65 181.253.201.23 91.222.236.85
181.13.157.28 71.72.231.176 219.233.194.178 151.72.28.135
47.104.188.241 182.56.182.230 95.59.133.29 146.126.160.168
123.125.251.40 77.241.18.2 91.255.172.205 82.2.76.48