Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.232.122.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11159
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.232.122.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 01:19:43 CST 2025
;; MSG SIZE  rcvd: 105
Host info
52.122.232.2.in-addr.arpa domain name pointer 2-232-122-52.ip212.fastwebnet.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.122.232.2.in-addr.arpa	name = 2-232-122-52.ip212.fastwebnet.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.67.77.148 attackbotsspam
Invalid user bjq from 114.67.77.148 port 41660
2020-04-05 10:39:35
112.78.0.37 attackbots
Brute force attack stopped by firewall
2020-04-05 10:23:48
103.36.124.158 attackspambots
Brute force attack stopped by firewall
2020-04-05 10:29:01
47.91.79.19 attackspambots
Tried sshing with brute force.
2020-04-05 10:24:56
103.224.49.34 attackbotsspam
Brute force attack stopped by firewall
2020-04-05 10:09:18
185.176.27.42 attackspam
04/04/2020-22:15:51.169146 185.176.27.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-05 10:16:25
178.69.191.120 attack
Brute force attack stopped by firewall
2020-04-05 10:19:22
145.255.28.2 attackbots
Brute force attack stopped by firewall
2020-04-05 10:17:05
41.169.79.166 attack
Brute force attack stopped by firewall
2020-04-05 10:41:40
181.189.221.245 attack
Brute force attack stopped by firewall
2020-04-05 10:15:10
106.245.197.234 attack
Brute force attack stopped by firewall
2020-04-05 10:34:19
146.196.109.74 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-05 10:26:13
217.146.86.154 attackbotsspam
" "
2020-04-05 10:38:10
61.84.196.50 attack
Apr  5 01:32:48 gitlab-tf sshd\[31026\]: Invalid user tomcat from 61.84.196.50Apr  5 01:34:51 gitlab-tf sshd\[31339\]: Invalid user dbuser from 61.84.196.50
...
2020-04-05 10:22:22
192.42.116.24 attack
Brute force attack stopped by firewall
2020-04-05 10:11:08

Recently Reported IPs

213.139.59.80 61.180.85.248 241.207.130.191 220.85.219.206
144.22.26.107 229.195.72.178 44.17.116.242 81.84.2.248
193.213.72.9 193.59.197.251 69.87.199.111 56.179.225.58
81.0.13.15 29.100.57.253 236.133.73.248 252.182.239.65
146.202.135.16 230.4.17.191 14.184.91.207 202.34.145.187