Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: LogicWeb Inc

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
$f2bV_matches
2019-12-27 01:17:32
Comments on same subnet:
IP Type Details Datetime
196.52.2.52 attackbotsspam
fail2ban - Attack against Apache (too many 404s)
2020-07-10 17:37:23
196.52.2.104 attackbots
TCP Port Scanning
2019-11-05 15:25:06
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.52.2.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.52.2.114.			IN	A

;; AUTHORITY SECTION:
.			533	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122600 1800 900 604800 86400

;; Query time: 140 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 27 01:17:28 CST 2019
;; MSG SIZE  rcvd: 116
Host info
114.2.52.196.in-addr.arpa domain name pointer ip-114-2-52-196.nyc.us.northamericancoax.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.2.52.196.in-addr.arpa	name = ip-114-2-52-196.nyc.us.northamericancoax.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
168.228.151.134 attackspam
Jun 30 09:28:27 web1 postfix/smtpd[25272]: warning: unknown[168.228.151.134]: SASL PLAIN authentication failed: authentication failure
...
2019-06-30 22:13:27
103.92.28.162 attack
Attempts to probe for or exploit a Drupal 7.67 site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-06-30 22:46:52
139.99.98.248 attack
Jun 30 15:25:02 lnxmail61 sshd[25506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.98.248
Jun 30 15:25:04 lnxmail61 sshd[25506]: Failed password for invalid user git from 139.99.98.248 port 56854 ssh2
Jun 30 15:28:39 lnxmail61 sshd[25816]: Failed password for root from 139.99.98.248 port 38236 ssh2
2019-06-30 22:10:25
103.224.247.216 attackspambots
Jun 30 13:27:29 marvibiene sshd[48351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.247.216  user=root
Jun 30 13:27:31 marvibiene sshd[48351]: Failed password for root from 103.224.247.216 port 28412 ssh2
Jun 30 13:27:40 marvibiene sshd[48351]: Failed password for root from 103.224.247.216 port 28412 ssh2
Jun 30 13:27:29 marvibiene sshd[48351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.247.216  user=root
Jun 30 13:27:31 marvibiene sshd[48351]: Failed password for root from 103.224.247.216 port 28412 ssh2
Jun 30 13:27:40 marvibiene sshd[48351]: Failed password for root from 103.224.247.216 port 28412 ssh2
...
2019-06-30 22:28:53
5.90.213.46 attack
Chat Spam
2019-06-30 21:58:07
104.248.239.22 attackbots
Jun 30 15:59:08 ns37 sshd[5388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.239.22
Jun 30 15:59:08 ns37 sshd[5388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.239.22
2019-06-30 22:50:00
188.255.89.2 attackbotsspam
Automatic report - Web App Attack
2019-06-30 22:34:44
139.180.6.99 attackspam
Looking for resource vulnerabilities
2019-06-30 22:24:02
74.96.157.227 attackspambots
Jun 25 04:52:34 server6 sshd[2775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-74-96-157-227.washdc.fios.verizon.net
Jun 25 04:52:36 server6 sshd[2775]: Failed password for invalid user connor from 74.96.157.227 port 37723 ssh2
Jun 25 04:52:36 server6 sshd[2775]: Received disconnect from 74.96.157.227: 11: Bye Bye [preauth]
Jun 25 04:55:39 server6 sshd[4823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-74-96-157-227.washdc.fios.verizon.net
Jun 25 04:55:41 server6 sshd[4823]: Failed password for invalid user eddy from 74.96.157.227 port 50652 ssh2
Jun 25 04:55:41 server6 sshd[4823]: Received disconnect from 74.96.157.227: 11: Bye Bye [preauth]
Jun 25 04:57:59 server6 sshd[6265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-74-96-157-227.washdc.fios.verizon.net
Jun 25 04:58:01 server6 sshd[6265]: Failed password for invalid use........
-------------------------------
2019-06-30 22:39:36
178.112.76.183 attack
leo_www
2019-06-30 22:09:45
115.55.81.91 attackbots
Telnet Server BruteForce Attack
2019-06-30 22:49:31
110.145.126.98 attack
Microsoft-Windows-Security-Auditing
2019-06-30 21:59:07
63.41.36.220 attackbots
Jun 30 15:28:56 vpn01 sshd\[20107\]: Invalid user webadmin from 63.41.36.220
Jun 30 15:28:56 vpn01 sshd\[20107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.41.36.220
Jun 30 15:28:58 vpn01 sshd\[20107\]: Failed password for invalid user webadmin from 63.41.36.220 port 34246 ssh2
2019-06-30 22:02:17
103.217.228.56 attack
Detected by ModSecurity. Request URI: /wp-login.php
2019-06-30 22:27:13
139.99.166.240 attackspambots
xmlrpc attack
2019-06-30 21:57:44

Recently Reported IPs

223.206.62.247 112.85.32.130 201.253.45.169 119.8.41.180
182.254.167.234 182.243.91.146 180.96.12.158 180.76.166.90
113.179.10.65 18.190.68.219 178.236.234.4 167.71.245.52
178.128.49.6 201.183.225.59 174.0.230.4 201.156.226.188
198.46.222.49 198.46.208.131 173.212.238.109 173.212.231.218