Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Edison

Region: New Jersey

Country: United States

Internet Service Provider: Net Systems Research LLC

Hostname: unknown

Organization: LeaseWeb Netherlands B.V.

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
SmallBizIT.US 1 packets to tcp(22)
2020-08-13 00:46:22
attackspambots
 TCP (SYN) 196.52.43.56:53388 -> port 389, len 44
2020-07-31 06:49:23
attackspambots
Unauthorized connection attempt detected from IP address 196.52.43.56 to port 9595
2020-06-20 16:33:25
attackbotsspam
Unauthorized connection attempt detected from IP address 196.52.43.56 to port 9418 [T]
2020-05-20 09:43:00
attackspam
Automatic report - Banned IP Access
2020-05-14 03:58:00
attackspambots
Port scan(s) denied
2020-05-02 15:26:40
attack
Port Scan: Events[2] countPorts[2]: 2002 2443 ..
2020-04-18 07:55:15
attackspam
Unauthorized connection attempt detected from IP address 196.52.43.56 to port 5916
2020-03-13 12:26:21
attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2020-03-04 04:43:30
attackspam
Unauthorized connection attempt detected from IP address 196.52.43.56
2020-03-03 18:50:05
attackspam
firewall-block, port(s): 1119/tcp
2020-02-24 08:52:51
attack
firewall-block, port(s): 6001/tcp
2020-02-22 00:39:17
attack
Unauthorized connection attempt detected from IP address 196.52.43.56 to port 68 [J]
2020-01-25 00:15:13
attackspambots
Unauthorized connection attempt detected from IP address 196.52.43.56 to port 5903
2019-12-29 08:54:29
attack
Unauthorized connection attempt detected from IP address 196.52.43.56 to port 8443
2019-12-29 02:55:24
attackbotsspam
firewall-block, port(s): 17185/udp
2019-12-27 19:42:38
attackbots
ICMP MH Probe, Scan /Distributed -
2019-12-03 19:41:18
attackbotsspam
1575110695 - 11/30/2019 11:44:55 Host: 196.52.43.56/196.52.43.56 Port: 139 TCP Blocked
2019-11-30 19:50:36
attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 00:34:38
attackbots
ICMP MH Probe, Scan /Distributed -
2019-11-16 05:54:06
attackbots
ICMP MP Probe, Scan -
2019-10-01 20:11:48
attackbots
Port Scan: TCP/5904
2019-09-25 08:09:02
attackbotsspam
firewall-block, port(s): 5984/tcp
2019-09-06 04:33:44
attackspambots
37777/tcp 593/tcp 8443/tcp...
[2019-07-05/09-03]64pkt,44pt.(tcp),4pt.(udp),1tp.(icmp)
2019-09-04 14:55:17
attack
Automatic report - Port Scan Attack
2019-08-10 15:13:31
attack
" "
2019-07-23 18:05:53
attack
firewall-block, port(s): 443/tcp
2019-07-05 22:03:15
attackbots
993/tcp 5060/udp 123/udp...
[2019-04-29/06-28]89pkt,44pt.(tcp),9pt.(udp)
2019-06-30 02:39:27
attackbotsspam
5060/udp 123/udp 37777/tcp...
[2019-04-25/06-25]90pkt,43pt.(tcp),10pt.(udp)
2019-06-25 19:22:34
attackbotsspam
22.06.2019 14:46:32 Connection to port 20249 blocked by firewall
2019-06-23 00:04:49
Comments on same subnet:
IP Type Details Datetime
196.52.43.60 attack
Automatic report - Banned IP Access
2020-10-14 07:46:54
196.52.43.115 attackbots
 TCP (SYN) 196.52.43.115:56130 -> port 2160, len 44
2020-10-13 17:32:04
196.52.43.114 attack
Unauthorized connection attempt from IP address 196.52.43.114 on port 995
2020-10-10 03:03:56
196.52.43.114 attackspam
Found on   Binary Defense     / proto=6  .  srcport=63823  .  dstport=8443  .     (1427)
2020-10-09 18:52:06
196.52.43.121 attackspam
Automatic report - Banned IP Access
2020-10-09 02:05:24
196.52.43.121 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-08 18:02:18
196.52.43.126 attack
 TCP (SYN) 196.52.43.126:54968 -> port 443, len 44
2020-10-08 03:08:25
196.52.43.128 attack
Icarus honeypot on github
2020-10-07 20:47:59
196.52.43.126 attack
ICMP MH Probe, Scan /Distributed -
2020-10-07 19:22:26
196.52.43.122 attack
 TCP (SYN) 196.52.43.122:52843 -> port 135, len 44
2020-10-07 01:36:24
196.52.43.114 attackbots
ET SCAN Suspicious inbound to Oracle SQL port 1521 - port: 1521 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-10-07 00:53:57
196.52.43.122 attackspam
Found on   CINS badguys     / proto=6  .  srcport=55544  .  dstport=37777  .     (1018)
2020-10-06 17:29:58
196.52.43.114 attackspam
IP 196.52.43.114 attacked honeypot on port: 593 at 10/6/2020 12:39:34 AM
2020-10-06 16:47:14
196.52.43.116 attackspambots
8899/tcp 990/tcp 9080/tcp...
[2020-08-03/10-03]83pkt,59pt.(tcp),5pt.(udp)
2020-10-05 06:15:24
196.52.43.123 attackspambots
6363/tcp 9042/tcp 9000/tcp...
[2020-08-04/10-03]65pkt,50pt.(tcp),2pt.(udp)
2020-10-05 06:00:35
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.52.43.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44327
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.52.43.56.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041502 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 16 07:05:20 +08 2019
;; MSG SIZE  rcvd: 116

Host info
56.43.52.196.in-addr.arpa domain name pointer 196.52.43.56.netsystemsresearch.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
56.43.52.196.in-addr.arpa	name = 196.52.43.56.netsystemsresearch.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
121.183.203.60 attackbotsspam
SSH Brute Force, server-1 sshd[6070]: Failed password for invalid user test from 121.183.203.60 port 52966 ssh2
2019-07-01 19:44:22
122.102.27.33 attackspam
scan z
2019-07-01 20:20:01
177.8.244.38 attackspam
ssh failed login
2019-07-01 19:43:15
112.238.141.40 attack
Unauthorised access (Jul  1) SRC=112.238.141.40 LEN=40 TTL=49 ID=59069 TCP DPT=23 WINDOW=12780 SYN
2019-07-01 20:14:24
185.234.219.75 attack
Jul  1 12:00:12 mail postfix/smtpd\[7292\]: warning: unknown\[185.234.219.75\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  1 12:30:57 mail postfix/smtpd\[7983\]: warning: unknown\[185.234.219.75\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  1 12:35:25 mail postfix/smtpd\[8613\]: warning: unknown\[185.234.219.75\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  1 12:38:02 mail postfix/smtpd\[8613\]: warning: unknown\[185.234.219.75\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-01 19:42:18
175.138.159.233 attack
Jul  1 11:02:19 giegler sshd[10623]: Invalid user rh from 175.138.159.233 port 33744
2019-07-01 19:41:50
103.194.184.74 attackbots
Brute forcing RDP port 3389
2019-07-01 20:03:40
77.237.69.165 attackspambots
Invalid user scaner from 77.237.69.165 port 44160
2019-07-01 20:20:15
162.252.58.70 attackbots
Jul  1 05:28:03 srv1 postfix/smtpd[5440]: connect from ns.ecodominio.com[162.252.58.70]
Jul x@x
Jul  1 05:28:09 srv1 postfix/smtpd[5440]: lost connection after RCPT from ns.ecodominio.com[162.252.58.70]
Jul  1 05:28:09 srv1 postfix/smtpd[5440]: disconnect from ns.ecodominio.com[162.252.58.70]
Jul  1 05:30:13 srv1 postfix/smtpd[3584]: connect from ns.ecodominio.com[162.252.58.70]
Jul x@x
Jul  1 05:30:19 srv1 postfix/smtpd[3584]: lost connection after RCPT from ns.ecodominio.com[162.252.58.70]
Jul  1 05:30:19 srv1 postfix/smtpd[3584]: disconnect from ns.ecodominio.com[162.252.58.70]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=162.252.58.70
2019-07-01 19:58:22
198.12.152.118 attack
20 attempts against mh-ssh on plane.magehost.pro
2019-07-01 20:20:42
153.126.215.150 attackspam
Jul  1 13:29:37 giegler sshd[13103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.126.215.150
Jul  1 13:29:37 giegler sshd[13103]: Invalid user hekz from 153.126.215.150 port 53720
Jul  1 13:29:40 giegler sshd[13103]: Failed password for invalid user hekz from 153.126.215.150 port 53720 ssh2
Jul  1 13:31:26 giegler sshd[13130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.126.215.150  user=mysql
Jul  1 13:31:28 giegler sshd[13130]: Failed password for mysql from 153.126.215.150 port 34155 ssh2
2019-07-01 19:48:12
91.134.140.32 attackspam
Jul  1 13:29:53 MK-Soft-Root1 sshd\[8029\]: Invalid user config from 91.134.140.32 port 33642
Jul  1 13:29:53 MK-Soft-Root1 sshd\[8029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32
Jul  1 13:29:55 MK-Soft-Root1 sshd\[8029\]: Failed password for invalid user config from 91.134.140.32 port 33642 ssh2
...
2019-07-01 20:05:57
222.89.74.123 attackspam
CN China - Failures: 5 smtpauth
2019-07-01 19:51:36
8.208.9.38 attackbots
Jul  1 13:50:28 core01 sshd\[29826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.208.9.38  user=root
Jul  1 13:50:30 core01 sshd\[29826\]: Failed password for root from 8.208.9.38 port 44804 ssh2
...
2019-07-01 20:06:58
138.94.210.114 attack
smtp auth brute force
2019-07-01 20:25:49

Recently Reported IPs

14.115.135.150 178.141.29.68 167.99.2.67 78.137.198.237
124.230.172.172 36.235.14.85 94.25.170.224 113.160.208.154
185.81.157.1 198.71.231.23 193.187.255.24 185.153.196.191
178.79.135.247 219.146.144.254 187.72.252.151 197.149.178.146
197.38.134.162 36.81.103.34 222.138.80.21 201.177.186.111