Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lexington

Region: Kentucky

Country: United States

Internet Service Provider: RTC Communications LLC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 209.252.3.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;209.252.3.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 17:03:49 CST 2025
;; MSG SIZE  rcvd: 104
Host info
5.3.252.209.in-addr.arpa domain name pointer 209-252-3-5.ip.mcleodusa.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.3.252.209.in-addr.arpa	name = 209-252-3-5.ip.mcleodusa.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
165.227.25.45 attack
'Fail2Ban'
2019-08-01 09:47:28
132.148.18.214 attack
Attempt to access prohibited URL /wp-login.php
2019-08-01 09:46:58
123.152.9.58 attackbots
firewall-block, port(s): 23/tcp
2019-08-01 09:19:33
31.202.101.40 attackspambots
B: /wp-login.php attack
2019-08-01 09:49:13
51.68.95.99 attackspambots
Aug  1 01:52:10 localhost sshd\[45007\]: Invalid user hb from 51.68.95.99 port 33272
Aug  1 01:52:10 localhost sshd\[45007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.95.99
...
2019-08-01 09:38:43
168.255.251.126 attackspambots
Jun 27 19:42:42 server sshd\[54130\]: Invalid user mirror04 from 168.255.251.126
Jun 27 19:42:42 server sshd\[54130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.255.251.126
Jun 27 19:42:44 server sshd\[54130\]: Failed password for invalid user mirror04 from 168.255.251.126 port 44348 ssh2
...
2019-08-01 09:15:57
151.236.23.99 attack
RDP Scan
2019-08-01 09:12:57
85.30.48.222 attack
Automatic report - Banned IP Access
2019-08-01 09:26:39
142.93.49.103 attackspam
Mar 19 10:15:44 vtv3 sshd\[8777\]: Invalid user admin from 142.93.49.103 port 38734
Mar 19 10:15:44 vtv3 sshd\[8777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.49.103
Mar 19 10:15:46 vtv3 sshd\[8777\]: Failed password for invalid user admin from 142.93.49.103 port 38734 ssh2
Mar 19 10:19:35 vtv3 sshd\[10163\]: Invalid user zachary from 142.93.49.103 port 42266
Mar 19 10:19:35 vtv3 sshd\[10163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.49.103
Apr  2 07:33:48 vtv3 sshd\[4081\]: Invalid user a from 142.93.49.103 port 55692
Apr  2 07:33:48 vtv3 sshd\[4081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.49.103
Apr  2 07:33:50 vtv3 sshd\[4081\]: Failed password for invalid user a from 142.93.49.103 port 55692 ssh2
Apr  2 07:39:25 vtv3 sshd\[6302\]: Invalid user ce from 142.93.49.103 port 34912
Apr  2 07:39:25 vtv3 sshd\[6302\]: pam_unix\(sshd:auth\):
2019-08-01 09:16:16
119.28.84.97 attack
Jul 31 20:47:25 MK-Soft-VM7 sshd\[19336\]: Invalid user kobayashi from 119.28.84.97 port 55170
Jul 31 20:47:25 MK-Soft-VM7 sshd\[19336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.84.97
Jul 31 20:47:27 MK-Soft-VM7 sshd\[19336\]: Failed password for invalid user kobayashi from 119.28.84.97 port 55170 ssh2
...
2019-08-01 09:26:10
201.244.94.189 attackspam
Aug  1 00:52:41 www sshd\[22249\]: Invalid user user1 from 201.244.94.189 port 44248
...
2019-08-01 09:53:09
139.198.122.90 attackbots
Jul 31 20:39:57 [munged] sshd[27211]: Invalid user vz from 139.198.122.90 port 34728
Jul 31 20:39:57 [munged] sshd[27211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.90
2019-08-01 09:24:22
36.65.123.199 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-01 09:15:25
221.146.233.140 attack
Aug  1 03:25:24 yabzik sshd[11568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.146.233.140
Aug  1 03:25:26 yabzik sshd[11568]: Failed password for invalid user ws from 221.146.233.140 port 58440 ssh2
Aug  1 03:30:50 yabzik sshd[13239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.146.233.140
2019-08-01 10:05:15
106.111.179.89 attack
Automatic report - Port Scan Attack
2019-08-01 09:27:42

Recently Reported IPs

19.144.134.21 24.209.10.236 110.89.242.106 112.245.80.245
118.149.183.183 101.181.129.89 116.99.72.207 105.53.31.221
98.77.216.20 107.94.52.135 75.164.77.145 8.246.92.162
110.32.103.111 141.214.41.167 11.129.146.86 215.144.53.110
72.182.202.174 57.0.146.114 54.132.147.22 34.154.187.102