Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.138.28.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.138.28.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:34:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 52.28.138.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.28.138.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
158.69.210.168 attackspam
$f2bV_matches
2020-03-05 05:23:55
171.8.68.61 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 05:23:32
181.40.73.86 attackbotsspam
Brute-force attempt banned
2020-03-05 05:15:08
218.89.241.68 attackbotsspam
Mar  4 21:55:58 nextcloud sshd\[29099\]: Invalid user jboss from 218.89.241.68
Mar  4 21:55:58 nextcloud sshd\[29099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.89.241.68
Mar  4 21:56:01 nextcloud sshd\[29099\]: Failed password for invalid user jboss from 218.89.241.68 port 37553 ssh2
2020-03-05 05:20:15
125.141.139.9 attackspam
Repeated brute force against a port
2020-03-05 05:29:58
185.232.30.130 attackspambots
Mar  4 22:34:43 debian-2gb-nbg1-2 kernel: \[5616856.507888\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.232.30.130 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=51692 PROTO=TCP SPT=51046 DPT=22220 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-05 05:43:40
190.180.63.109 attackspambots
20/3/4@08:31:45: FAIL: Alarm-Network address from=190.180.63.109
...
2020-03-05 05:27:25
218.92.0.132 attackspambots
$f2bV_matches
2020-03-05 05:16:24
206.189.36.106 attackbotsspam
suspicious action Wed, 04 Mar 2020 11:09:05 -0300
2020-03-05 05:48:12
218.75.132.59 attackbotsspam
$f2bV_matches
2020-03-05 05:43:17
213.248.190.75 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-05 05:42:24
41.33.197.133 attackbotsspam
Unauthorized connection attempt from IP address 41.33.197.133 on Port 445(SMB)
2020-03-05 05:15:56
116.105.37.128 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 05:51:57
14.161.27.189 attackspambots
Unauthorized connection attempt from IP address 14.161.27.189 on Port 445(SMB)
2020-03-05 05:44:07
218.78.44.63 attackbots
$f2bV_matches
2020-03-05 05:27:09

Recently Reported IPs

113.32.238.132 25.65.210.45 37.51.207.176 53.243.229.106
90.1.158.44 51.240.107.224 223.17.95.139 209.253.2.241
41.24.135.84 86.227.62.105 24.127.215.242 39.247.197.251
170.23.87.15 222.198.122.28 106.72.173.49 242.159.62.43
229.54.61.213 118.170.117.200 144.244.126.172 59.86.36.41