Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Belo Horizonte

Region: Minas Gerais

Country: Brazil

Internet Service Provider: Claro

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.52.194.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.52.194.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 10:21:43 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 13.194.52.189.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.194.52.189.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.221.204.114 attackbots
Automatic report - Banned IP Access
2020-09-27 23:19:50
156.96.114.102 attackbots
SSH login attempts with user root.
2020-09-27 23:45:37
200.194.34.103 attackbots
Automatic report - Port Scan Attack
2020-09-27 23:47:00
222.186.42.137 attack
2020-09-27T15:26:40.837918shield sshd\[12517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-09-27T15:26:42.828888shield sshd\[12517\]: Failed password for root from 222.186.42.137 port 55808 ssh2
2020-09-27T15:26:45.502892shield sshd\[12517\]: Failed password for root from 222.186.42.137 port 55808 ssh2
2020-09-27T15:26:48.107010shield sshd\[12517\]: Failed password for root from 222.186.42.137 port 55808 ssh2
2020-09-27T15:26:52.396545shield sshd\[12555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-09-27 23:30:22
54.172.123.183 attackspambots
cloud+mapping+experiment.+contact+research@pdrlabs.net
2020-09-27 23:43:22
132.232.68.138 attackspambots
Sep 27 15:01:21 *hidden* sshd[62149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.138 Sep 27 15:01:23 *hidden* sshd[62149]: Failed password for invalid user prueba from 132.232.68.138 port 38852 ssh2 Sep 27 15:14:21 *hidden* sshd[62468]: Invalid user alfredo from 132.232.68.138 port 33534
2020-09-27 23:48:38
202.98.203.27 attack
Found on   Alienvault    / proto=6  .  srcport=48033  .  dstport=1433  .     (2668)
2020-09-27 23:26:01
168.62.43.33 attackbotsspam
Invalid user admin from 168.62.43.33 port 39103
2020-09-27 23:53:14
116.20.229.236 attackspam
Found on   CINS badguys     / proto=6  .  srcport=64881  .  dstport=23  .     (2664)
2020-09-27 23:53:36
52.142.195.37 attack
Invalid user vmadmin from 52.142.195.37 port 47629
2020-09-27 23:25:47
180.20.113.135 attackspambots
Auto Fail2Ban report, multiple SSH login attempts.
2020-09-27 23:31:37
61.135.152.130 attackspambots
Port probing on unauthorized port 1433
2020-09-27 23:21:41
118.24.151.254 attack
(sshd) Failed SSH login from 118.24.151.254 (CN/China/-): 5 in the last 3600 secs
2020-09-27 23:46:08
168.63.16.141 attackspambots
Invalid user stemys from 168.63.16.141 port 17166
2020-09-27 23:18:00
188.168.231.173 attackbotsspam
1601152660 - 09/26/2020 22:37:40 Host: 188.168.231.173/188.168.231.173 Port: 445 TCP Blocked
2020-09-27 23:50:42

Recently Reported IPs

228.187.240.159 197.141.251.100 209.42.150.161 218.103.191.75
252.212.246.63 198.247.17.145 132.50.115.66 151.5.191.202
41.39.199.89 134.216.10.227 15.201.199.28 116.230.144.23
173.179.168.214 195.133.84.98 141.182.153.59 113.72.172.250
94.97.143.207 127.76.31.187 43.115.137.19 185.194.190.245