Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.43.53.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.43.53.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 22:44:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
252.53.43.150.in-addr.arpa domain name pointer dhcp53-252.mas.fit.ac.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
252.53.43.150.in-addr.arpa	name = dhcp53-252.mas.fit.ac.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
87.190.16.229 attackbots
$f2bV_matches
2020-09-29 19:04:15
187.32.234.131 attackspambots
Unauthorized connection attempt from IP address 187.32.234.131 on Port 445(SMB)
2020-09-29 19:09:32
37.0.125.109 attackbots
Unauthorized connection attempt from IP address 37.0.125.109 on Port 445(SMB)
2020-09-29 19:28:37
125.166.29.107 attackbotsspam
Automatic report - Port Scan Attack
2020-09-29 19:05:40
1.55.230.170 attackbotsspam
Unauthorized connection attempt from IP address 1.55.230.170 on Port 445(SMB)
2020-09-29 19:32:24
152.200.140.110 attackspambots
Unauthorized connection attempt from IP address 152.200.140.110 on Port 445(SMB)
2020-09-29 19:19:49
119.29.10.25 attackspam
sshd: Failed password for invalid user .... from 119.29.10.25 port 59874 ssh2 (5 attempts)
2020-09-29 19:18:13
194.170.156.9 attack
Invalid user security from 194.170.156.9 port 39455
2020-09-29 19:21:32
68.183.146.178 attackspambots
2020-09-29 04:47:10,965 fail2ban.actions: WARNING [ssh] Ban 68.183.146.178
2020-09-29 19:10:32
118.25.24.146 attackbots
"Unauthorized connection attempt on SSHD detected"
2020-09-29 19:09:09
34.68.180.110 attackbotsspam
[ssh] SSH attack
2020-09-29 19:38:01
118.25.39.110 attackspambots
Sep 29 05:21:20 marvibiene sshd[19226]: Failed password for root from 118.25.39.110 port 39324 ssh2
Sep 29 05:26:41 marvibiene sshd[19467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.39.110 
Sep 29 05:26:43 marvibiene sshd[19467]: Failed password for invalid user www from 118.25.39.110 port 41194 ssh2
2020-09-29 19:07:00
139.59.70.186 attack
Found on   Github Combined on 4 lists    / proto=6  .  srcport=53107  .  dstport=20959  .     (1429)
2020-09-29 19:39:36
192.241.234.202 attack
IP 192.241.234.202 attacked honeypot on port: 143 at 9/28/2020 11:57:45 PM
2020-09-29 19:43:33
80.82.77.245 attack
80.82.77.245 was recorded 9 times by 4 hosts attempting to connect to the following ports: 497,515,631. Incident counter (4h, 24h, all-time): 9, 32, 27690
2020-09-29 19:16:57

Recently Reported IPs

61.20.19.6 118.237.177.55 16.76.87.221 104.137.97.15
180.35.9.74 57.123.39.111 160.118.26.115 146.34.79.197
229.160.41.195 217.30.210.13 61.120.171.244 212.60.123.34
235.15.45.187 206.1.0.8 4.220.214.226 59.43.218.122
92.243.151.60 215.4.164.238 77.99.104.73 252.104.3.117