Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 182.52.249.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;182.52.249.140.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100901 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 10 04:02:10 CST 2020
;; MSG SIZE  rcvd: 118
Host info
140.249.52.182.in-addr.arpa domain name pointer node-1dak.pool-182-52.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.249.52.182.in-addr.arpa	name = node-1dak.pool-182-52.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.14.10.212 attack
ICMP MH Probe, Scan /Distributed -
2020-05-26 16:28:36
222.186.175.150 attack
May 26 08:54:11 combo sshd[11185]: Failed password for root from 222.186.175.150 port 33972 ssh2
May 26 08:54:14 combo sshd[11185]: Failed password for root from 222.186.175.150 port 33972 ssh2
May 26 08:54:17 combo sshd[11185]: Failed password for root from 222.186.175.150 port 33972 ssh2
...
2020-05-26 16:06:17
162.14.10.94 attackbots
ICMP MH Probe, Scan /Distributed -
2020-05-26 16:17:17
106.12.69.35 attackbotsspam
May 26 03:30:13 NPSTNNYC01T sshd[9423]: Failed password for root from 106.12.69.35 port 35806 ssh2
May 26 03:31:42 NPSTNNYC01T sshd[9630]: Failed password for root from 106.12.69.35 port 54570 ssh2
...
2020-05-26 15:58:42
113.161.49.100 attackbotsspam
Unauthorized connection attempt from IP address 113.161.49.100 on Port 445(SMB)
2020-05-26 16:28:59
85.21.78.213 attack
May 26 09:58:21 server sshd[14959]: Failed password for root from 85.21.78.213 port 13074 ssh2
May 26 10:02:13 server sshd[15983]: Failed password for root from 85.21.78.213 port 43652 ssh2
...
2020-05-26 16:10:22
114.234.252.55 attack
spam
2020-05-26 15:54:36
203.57.236.89 attack
Lines containing failures of 203.57.236.89
May 25 03:17:44 shared09 sshd[26272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.57.236.89  user=r.r
May 25 03:17:46 shared09 sshd[26272]: Failed password for r.r from 203.57.236.89 port 36498 ssh2
May 25 03:17:46 shared09 sshd[26272]: Received disconnect from 203.57.236.89 port 36498:11: Bye Bye [preauth]
May 25 03:17:46 shared09 sshd[26272]: Disconnected from authenticating user r.r 203.57.236.89 port 36498 [preauth]
May 25 03:28:08 shared09 sshd[30536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.57.236.89  user=backup
May 25 03:28:10 shared09 sshd[30536]: Failed password for backup from 203.57.236.89 port 52818 ssh2
May 25 03:28:10 shared09 sshd[30536]: Received disconnect from 203.57.236.89 port 52818:11: Bye Bye [preauth]
May 25 03:28:10 shared09 sshd[30536]: Disconnected from authenticating user backup 203.57.236.89 port 52818........
------------------------------
2020-05-26 16:33:14
162.14.10.227 attackspam
ICMP MH Probe, Scan /Distributed -
2020-05-26 16:23:08
162.14.12.152 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-05-26 16:07:05
176.158.187.198 attack
May 26 09:32:50 web sshd[102040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.158.187.198 
May 26 09:32:50 web sshd[102040]: Invalid user pi from 176.158.187.198 port 47282
May 26 09:32:52 web sshd[102040]: Failed password for invalid user pi from 176.158.187.198 port 47282 ssh2
...
2020-05-26 16:25:01
178.88.86.18 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 16:08:23
162.14.12.107 attackbots
ICMP MH Probe, Scan /Distributed -
2020-05-26 16:14:18
14.229.145.82 attackspam
Unauthorized connection attempt from IP address 14.229.145.82 on Port 445(SMB)
2020-05-26 16:19:29
36.92.174.133 attackspambots
May 26 09:39:25 [host] sshd[12936]: pam_unix(sshd:
May 26 09:39:27 [host] sshd[12936]: Failed passwor
May 26 09:41:35 [host] sshd[13042]: pam_unix(sshd:
2020-05-26 16:07:40

Recently Reported IPs

12.207.228.109 5.63.118.90 110.76.68.208 88.232.131.114
191.89.197.238 173.77.107.18 219.205.44.187 177.4.180.150
124.241.185.12 210.68.249.26 110.189.92.174 155.143.169.124
82.75.54.217 105.112.99.122 181.112.99.213 87.130.158.246
103.53.0.29 14.250.177.203 92.94.160.164 201.140.126.71