Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Huntington Park

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.4.253.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.4.253.52.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011000 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 10 17:41:35 CST 2025
;; MSG SIZE  rcvd: 105
Host info
52.253.4.172.in-addr.arpa domain name pointer 172-4-253-52.lightspeed.irvnca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.253.4.172.in-addr.arpa	name = 172-4-253-52.lightspeed.irvnca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.147.31 attack
2019-08-22T19:35:19.177000abusebot-3.cloudsearch.cf sshd\[25686\]: Invalid user key from 106.13.147.31 port 48376
2019-08-23 04:15:45
191.53.223.200 attack
failed_logins
2019-08-23 04:33:46
58.87.114.13 attackspam
Aug 22 09:31:48 hcbb sshd\[29699\]: Invalid user 2 from 58.87.114.13
Aug 22 09:31:48 hcbb sshd\[29699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.114.13
Aug 22 09:31:50 hcbb sshd\[29699\]: Failed password for invalid user 2 from 58.87.114.13 port 46974 ssh2
Aug 22 09:35:23 hcbb sshd\[29975\]: Invalid user teamspeak from 58.87.114.13
Aug 22 09:35:23 hcbb sshd\[29975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.114.13
2019-08-23 04:11:51
72.189.130.39 attackspam
Aug 22 20:21:43 hcbbdb sshd\[3313\]: Invalid user gretta from 72.189.130.39
Aug 22 20:21:43 hcbbdb sshd\[3313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=072-189-130-039.res.spectrum.com
Aug 22 20:21:44 hcbbdb sshd\[3313\]: Failed password for invalid user gretta from 72.189.130.39 port 38211 ssh2
Aug 22 20:31:19 hcbbdb sshd\[4508\]: Invalid user guest from 72.189.130.39
Aug 22 20:31:19 hcbbdb sshd\[4508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=072-189-130-039.res.spectrum.com
2019-08-23 04:38:35
51.255.192.217 attackspambots
Aug 22 20:29:01 vtv3 sshd\[31182\]: Invalid user mysql from 51.255.192.217 port 44632
Aug 22 20:29:01 vtv3 sshd\[31182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.192.217
Aug 22 20:29:03 vtv3 sshd\[31182\]: Failed password for invalid user mysql from 51.255.192.217 port 44632 ssh2
Aug 22 20:32:52 vtv3 sshd\[803\]: Invalid user weblogic from 51.255.192.217 port 32950
Aug 22 20:32:52 vtv3 sshd\[803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.192.217
Aug 22 20:44:01 vtv3 sshd\[6197\]: Invalid user VM from 51.255.192.217 port 54368
Aug 22 20:44:01 vtv3 sshd\[6197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.192.217
Aug 22 20:44:03 vtv3 sshd\[6197\]: Failed password for invalid user VM from 51.255.192.217 port 54368 ssh2
Aug 22 20:48:04 vtv3 sshd\[8252\]: Invalid user meteo from 51.255.192.217 port 42688
Aug 22 20:48:04 vtv3 sshd\[8252\]: pam_unix
2019-08-23 04:30:09
185.225.39.227 attack
WordPress login Brute force / Web App Attack on client site.
2019-08-23 04:18:11
159.89.199.216 attackbotsspam
Aug 22 10:25:02 php2 sshd\[22093\]: Invalid user celia from 159.89.199.216
Aug 22 10:25:02 php2 sshd\[22093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.199.216
Aug 22 10:25:04 php2 sshd\[22093\]: Failed password for invalid user celia from 159.89.199.216 port 59860 ssh2
Aug 22 10:29:33 php2 sshd\[22852\]: Invalid user anurag from 159.89.199.216
Aug 22 10:29:33 php2 sshd\[22852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.199.216
2019-08-23 04:38:07
142.93.15.1 attack
Aug 22 16:04:23 vps200512 sshd\[32667\]: Invalid user joel from 142.93.15.1
Aug 22 16:04:23 vps200512 sshd\[32667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.15.1
Aug 22 16:04:25 vps200512 sshd\[32667\]: Failed password for invalid user joel from 142.93.15.1 port 38390 ssh2
Aug 22 16:08:28 vps200512 sshd\[32742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.15.1  user=root
Aug 22 16:08:31 vps200512 sshd\[32742\]: Failed password for root from 142.93.15.1 port 60918 ssh2
2019-08-23 04:18:32
68.64.61.11 attack
Aug 22 10:35:43 hcbb sshd\[2325\]: Invalid user bob from 68.64.61.11
Aug 22 10:35:43 hcbb sshd\[2325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.64.61.11
Aug 22 10:35:45 hcbb sshd\[2325\]: Failed password for invalid user bob from 68.64.61.11 port 44233 ssh2
Aug 22 10:39:51 hcbb sshd\[2742\]: Invalid user rumbidzai from 68.64.61.11
Aug 22 10:39:51 hcbb sshd\[2742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.64.61.11
2019-08-23 04:46:45
52.172.199.166 attackspambots
Aug 23 01:56:18 areeb-Workstation sshd\[18282\]: Invalid user maffiaw from 52.172.199.166
Aug 23 01:56:18 areeb-Workstation sshd\[18282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.199.166
Aug 23 01:56:19 areeb-Workstation sshd\[18282\]: Failed password for invalid user maffiaw from 52.172.199.166 port 45454 ssh2
...
2019-08-23 04:39:06
117.44.171.251 attackbotsspam
Unauthorized connection attempt from IP address 117.44.171.251 on Port 445(SMB)
2019-08-23 04:22:34
190.149.69.118 attack
Unauthorized connection attempt from IP address 190.149.69.118 on Port 445(SMB)
2019-08-23 04:48:12
165.227.165.98 attack
Aug 22 10:17:08 kapalua sshd\[15194\]: Invalid user diradmin from 165.227.165.98
Aug 22 10:17:08 kapalua sshd\[15194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.165.98
Aug 22 10:17:11 kapalua sshd\[15194\]: Failed password for invalid user diradmin from 165.227.165.98 port 52980 ssh2
Aug 22 10:20:57 kapalua sshd\[15506\]: Invalid user ubuntu from 165.227.165.98
Aug 22 10:20:57 kapalua sshd\[15506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.165.98
2019-08-23 04:27:21
81.30.212.14 attackspambots
Aug 22 22:09:38 rpi sshd[30242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.212.14 
Aug 22 22:09:40 rpi sshd[30242]: Failed password for invalid user manager from 81.30.212.14 port 40178 ssh2
2019-08-23 04:10:36
94.176.77.55 attackbots
(Aug 22)  LEN=40 TTL=244 ID=12494 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=20591 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=51435 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=63695 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=29772 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=25636 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=44623 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=12422 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=27772 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=43715 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=52409 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 22)  LEN=40 TTL=244 ID=11023 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 21)  LEN=40 TTL=244 ID=17452 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 21)  LEN=40 TTL=244 ID=60922 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 21)  LEN=40 TTL=244 ID=40027 DF TCP DPT=23 WINDOW=14600 ...
2019-08-23 04:36:38

Recently Reported IPs

231.17.116.139 61.242.209.183 36.250.249.28 122.192.133.176
49.145.107.138 16.204.133.134 83.250.26.34 45.234.70.80
178.43.160.188 254.99.106.126 91.116.118.18 116.42.125.224
151.101.2.3 2a01:111:f403:2c16:0:0:0:81f 2a01:111:f403:2c16::81f 2002:a50:c30f:0:b0:5d9:6f33:dd4
112.2.166.81 223.77.139.181 185.116.209.55 160.177.191.189