Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 173.204.5.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;173.204.5.52.			IN	A

;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 05:13:50 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 52.5.204.173.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.5.204.173.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
163.178.170.13 attackbotsspam
Mar 28 23:12:02 vps sshd[142524]: Failed password for invalid user pjs from 163.178.170.13 port 36304 ssh2
Mar 28 23:16:36 vps sshd[169387]: Invalid user teamspeak from 163.178.170.13 port 52182
Mar 28 23:16:36 vps sshd[169387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.178.170.13
Mar 28 23:16:38 vps sshd[169387]: Failed password for invalid user teamspeak from 163.178.170.13 port 52182 ssh2
Mar 28 23:21:02 vps sshd[193549]: Invalid user kmt from 163.178.170.13 port 39830
...
2020-03-29 07:24:46
181.143.211.50 attackspam
Unauthorized connection attempt detected from IP address 181.143.211.50 to port 445
2020-03-29 07:22:59
23.24.78.18 attackspambots
23/tcp 23/tcp 23/tcp
[2020-03-16/28]3pkt
2020-03-29 07:15:52
178.137.160.251 attackbots
445/tcp 445/tcp 445/tcp...
[2020-02-17/03-28]8pkt,1pt.(tcp)
2020-03-29 07:36:15
120.70.100.215 attack
Invalid user waski from 120.70.100.215 port 38285
2020-03-29 07:15:05
182.48.38.103 attackspambots
SSH-bruteforce attempts
2020-03-29 07:26:02
122.116.78.25 attack
81/tcp 23/tcp...
[2020-02-26/03-28]10pkt,2pt.(tcp)
2020-03-29 07:26:27
14.161.49.16 attack
445/tcp
[2020-03-28]1pkt
2020-03-29 07:47:22
109.87.115.220 attackspam
Invalid user z from 109.87.115.220 port 53336
2020-03-29 07:49:28
200.69.250.253 attackspambots
Invalid user cacti from 200.69.250.253 port 52071
2020-03-29 07:30:43
61.147.103.68 attackspam
1433/tcp 1433/tcp 1433/tcp...
[2020-01-29/03-28]9pkt,1pt.(tcp)
2020-03-29 07:18:23
45.40.201.5 attack
Invalid user dii from 45.40.201.5 port 48200
2020-03-29 07:19:44
2.38.181.39 attack
Mar 28 16:14:49 mockhub sshd[4676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.38.181.39
Mar 28 16:14:51 mockhub sshd[4676]: Failed password for invalid user mba from 2.38.181.39 port 56553 ssh2
...
2020-03-29 07:16:12
125.124.253.203 attackbotsspam
(sshd) Failed SSH login from 125.124.253.203 (CN/China/-): 5 in the last 3600 secs
2020-03-29 07:20:27
118.174.45.29 attack
Invalid user xrt from 118.174.45.29 port 59796
2020-03-29 07:15:36

Recently Reported IPs

17.98.131.152 227.133.186.209 122.173.33.194 6.94.158.130
27.48.110.121 154.91.235.252 190.191.30.56 254.209.53.136
222.193.18.215 65.247.175.225 246.120.85.186 238.107.183.233
116.156.22.110 70.114.188.11 173.67.35.44 138.23.104.0
161.207.236.80 136.163.74.226 18.162.12.208 247.38.253.87