Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.252.52.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23362
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;204.252.52.54.			IN	A

;; AUTHORITY SECTION:
.			549	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092701 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 28 13:53:58 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 54.52.252.204.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.136, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 54.52.252.204.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
182.122.68.93 attackspambots
Sep  4 18:37:38 www sshd[31209]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [182.122.68.93] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep  4 18:37:38 www sshd[31209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.68.93  user=r.r
Sep  4 18:37:40 www sshd[31209]: Failed password for r.r from 182.122.68.93 port 8412 ssh2
Sep  4 18:37:40 www sshd[31209]: Received disconnect from 182.122.68.93: 11: Bye Bye [preauth]
Sep  4 18:47:18 www sshd[31678]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [182.122.68.93] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep  4 18:47:18 www sshd[31678]: Invalid user admin from 182.122.68.93
Sep  4 18:47:18 www sshd[31678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.68.93 
Sep  4 18:47:20 www sshd[31678]: Failed password for invalid user admin from 182.122.68.93 port 59448 ssh2
Sep  4 18:47:21 www sshd[31678]: Received disconnec........
-------------------------------
2020-09-06 21:42:53
200.233.231.104 attack
trying to access non-authorized port
2020-09-06 21:58:13
193.29.15.169 attackbots
 UDP 193.29.15.169:46815 -> port 1900, len 118
2020-09-06 22:02:59
210.75.240.13 attackspambots
 TCP (SYN) 210.75.240.13:50026 -> port 12736, len 44
2020-09-06 21:56:34
67.205.162.223 attackbotsspam
Sep  6 18:28:13 gw1 sshd[11136]: Failed password for root from 67.205.162.223 port 34636 ssh2
...
2020-09-06 21:41:58
77.40.62.7 attack
2020-09-05 17:01 SMTP:25 IP autobanned - 2 attempts  a day
2020-09-06 22:08:42
1.232.176.9 attack
RDPBrutePap24
2020-09-06 22:06:45
47.91.226.110 attackbots
2020-09-05 10:52:52,482 fail2ban.actions        [501]: NOTICE  [wordpress-beatrice-main] Ban 47.91.226.110
2020-09-05 20:52:11,970 fail2ban.actions        [501]: NOTICE  [wordpress-beatrice-main] Ban 47.91.226.110
2020-09-06 03:07:22,729 fail2ban.actions        [501]: NOTICE  [wordpress-beatrice-main] Ban 47.91.226.110
...
2020-09-06 21:38:32
194.180.224.130 attack
Sep  6 15:47:02 piServer sshd[1452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130 
Sep  6 15:47:02 piServer sshd[1451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130 
...
2020-09-06 21:49:03
112.85.42.232 attackbotsspam
Sep  6 15:30:34 home sshd[990060]: Failed password for root from 112.85.42.232 port 61023 ssh2
Sep  6 15:30:39 home sshd[990060]: Failed password for root from 112.85.42.232 port 61023 ssh2
Sep  6 15:30:44 home sshd[990060]: Failed password for root from 112.85.42.232 port 61023 ssh2
Sep  6 15:31:42 home sshd[990162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Sep  6 15:31:44 home sshd[990162]: Failed password for root from 112.85.42.232 port 25041 ssh2
...
2020-09-06 21:43:36
5.188.86.164 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-06T13:52:42Z
2020-09-06 21:53:55
107.189.11.163 attackspam
2020-09-06T15:16[Censored Hostname] sshd[33540]: Failed password for root from 107.189.11.163 port 45940 ssh2
2020-09-06T15:16[Censored Hostname] sshd[33540]: Failed password for root from 107.189.11.163 port 45940 ssh2
2020-09-06T15:16[Censored Hostname] sshd[33540]: Failed password for root from 107.189.11.163 port 45940 ssh2[...]
2020-09-06 21:46:18
103.145.12.217 attackbotsspam
[2020-09-06 07:29:58] NOTICE[1194] chan_sip.c: Registration from '"601" ' failed for '103.145.12.217:6186' - Wrong password
[2020-09-06 07:29:58] SECURITY[1233] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-06T07:29:58.978-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="601",SessionID="0x7f2ddc1b7848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.217/6186",Challenge="78258ec9",ReceivedChallenge="78258ec9",ReceivedHash="d9dfa3d8262850f61f3df33856fdb051"
[2020-09-06 07:29:59] NOTICE[1194] chan_sip.c: Registration from '"601" ' failed for '103.145.12.217:6186' - Wrong password
[2020-09-06 07:29:59] SECURITY[1233] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-06T07:29:59.114-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="601",SessionID="0x7f2ddc12c6d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.1
...
2020-09-06 21:59:47
148.72.209.9 attackbotsspam
148.72.209.9 - - \[06/Sep/2020:15:28:47 +0200\] "POST /wp-login.php HTTP/1.1" 200 12843 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
148.72.209.9 - - \[06/Sep/2020:15:28:49 +0200\] "POST /wp-login.php HTTP/1.1" 200 12678 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-09-06 22:01:01
85.171.52.251 attackspambots
2020-09-06T08:26:46.127506shield sshd\[19964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85-171-52-251.rev.numericable.fr  user=root
2020-09-06T08:26:47.918423shield sshd\[19964\]: Failed password for root from 85.171.52.251 port 48514 ssh2
2020-09-06T08:35:04.944943shield sshd\[21434\]: Invalid user db2fenc1 from 85.171.52.251 port 55392
2020-09-06T08:35:04.954036shield sshd\[21434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85-171-52-251.rev.numericable.fr
2020-09-06T08:35:06.436372shield sshd\[21434\]: Failed password for invalid user db2fenc1 from 85.171.52.251 port 55392 ssh2
2020-09-06 21:30:43

Recently Reported IPs

107.151.159.206 82.92.189.25 112.85.42.98 131.236.187.41
122.194.229.54 1.172.239.197 160.16.143.29 107.172.43.217
47.176.38.253 39.109.115.153 242.106.151.134 122.194.229.122
167.24.102.34 58.44.161.127 227.50.204.75 200.46.8.27
58.101.150.220 186.193.220.184 202.184.30.216 185.111.255.245