Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frederiksberg

Region: Region Hovedstaden

Country: Denmark

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.131.252.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42983
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.131.252.146.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030802 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 13:10:31 CST 2025
;; MSG SIZE  rcvd: 106
Host info
146.252.131.2.in-addr.arpa domain name pointer 002131252146.mbb.telenor.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
146.252.131.2.in-addr.arpa	name = 002131252146.mbb.telenor.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.236.52.94 attackspambots
Sep 14 23:19:20 lnxded64 sshd[16437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.52.94
2019-09-15 07:16:16
118.122.124.78 attackspambots
Sep 14 22:20:21 v22019058497090703 sshd[15129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.122.124.78
Sep 14 22:20:23 v22019058497090703 sshd[15129]: Failed password for invalid user national from 118.122.124.78 port 26061 ssh2
Sep 14 22:24:01 v22019058497090703 sshd[15396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.122.124.78
...
2019-09-15 07:31:41
130.61.83.71 attack
Sep 14 20:04:03 icinga sshd[45619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.83.71 
Sep 14 20:04:05 icinga sshd[45619]: Failed password for invalid user admin from 130.61.83.71 port 49815 ssh2
Sep 14 20:15:47 icinga sshd[53764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.83.71 
...
2019-09-15 07:31:13
58.246.187.102 attackbots
Sep 14 12:09:40 auw2 sshd\[31084\]: Invalid user sysadmin from 58.246.187.102
Sep 14 12:09:40 auw2 sshd\[31084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.187.102
Sep 14 12:09:42 auw2 sshd\[31084\]: Failed password for invalid user sysadmin from 58.246.187.102 port 60992 ssh2
Sep 14 12:14:01 auw2 sshd\[31504\]: Invalid user volunteer from 58.246.187.102
Sep 14 12:14:01 auw2 sshd\[31504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.187.102
2019-09-15 07:13:27
60.220.230.21 attackbotsspam
Sep 14 22:49:22 MK-Soft-VM5 sshd\[1471\]: Invalid user xl from 60.220.230.21 port 42840
Sep 14 22:49:22 MK-Soft-VM5 sshd\[1471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.230.21
Sep 14 22:49:23 MK-Soft-VM5 sshd\[1471\]: Failed password for invalid user xl from 60.220.230.21 port 42840 ssh2
...
2019-09-15 07:09:43
111.125.66.234 attackbots
Sep 14 08:45:43 lcprod sshd\[19835\]: Invalid user biman from 111.125.66.234
Sep 14 08:45:43 lcprod sshd\[19835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.125.66.234
Sep 14 08:45:45 lcprod sshd\[19835\]: Failed password for invalid user biman from 111.125.66.234 port 57406 ssh2
Sep 14 08:49:59 lcprod sshd\[20223\]: Invalid user wiki from 111.125.66.234
Sep 14 08:49:59 lcprod sshd\[20223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.125.66.234
2019-09-15 07:20:12
117.220.67.62 attackspam
firewall-block, port(s): 60001/tcp
2019-09-15 07:36:40
196.20.253.225 attackbotsspam
Chat Spam
2019-09-15 07:06:11
165.22.209.133 attack
Sep 15 01:06:55 lnxded63 sshd[10287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.209.133
Sep 15 01:06:57 lnxded63 sshd[10287]: Failed password for invalid user adolph from 165.22.209.133 port 36986 ssh2
Sep 15 01:11:03 lnxded63 sshd[10733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.209.133
2019-09-15 07:34:10
5.219.242.61 attackbots
Automatic report - Port Scan Attack
2019-09-15 07:14:40
165.22.193.16 attack
Sep 15 01:15:17 core sshd[3936]: Invalid user user from 165.22.193.16 port 35422
Sep 15 01:15:20 core sshd[3936]: Failed password for invalid user user from 165.22.193.16 port 35422 ssh2
...
2019-09-15 07:38:27
122.246.161.93 attackbots
Automatic report - Port Scan Attack
2019-09-15 07:35:01
196.52.43.95 attackbotsspam
firewall-block, port(s): 9443/tcp
2019-09-15 07:19:15
210.14.69.76 attackspambots
$f2bV_matches
2019-09-15 07:30:39
182.253.105.93 attack
Sep 14 23:28:25 game-panel sshd[29232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.105.93
Sep 14 23:28:28 game-panel sshd[29232]: Failed password for invalid user 123456 from 182.253.105.93 port 36526 ssh2
Sep 14 23:32:57 game-panel sshd[29385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.105.93
2019-09-15 07:33:39

Recently Reported IPs

211.17.185.231 118.146.16.142 213.105.192.195 45.165.253.250
85.223.146.72 224.158.195.141 145.174.135.65 52.30.46.243
52.163.124.217 249.187.28.253 88.146.134.1 85.135.247.101
190.38.46.147 196.250.131.172 23.73.47.141 177.104.223.118
139.124.49.86 23.129.10.122 214.84.97.163 116.16.245.64