Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 215.84.13.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42285
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;215.84.13.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:26:10 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 52.13.84.215.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 215.84.13.52.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
89.248.162.168 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-26 16:06:53
1.25.82.14 attackbots
DATE:2019-06-26 05:48:59, IP:1.25.82.14, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-06-26 16:34:06
150.95.24.180 attackbotsspam
Automatic report - Web App Attack
2019-06-26 16:51:51
159.203.103.120 attackbots
Invalid user admin from 159.203.103.120 port 60404
2019-06-26 16:11:39
123.206.76.184 attack
2019-06-26T07:19:51.126118scmdmz1 sshd\[13485\]: Invalid user lionel from 123.206.76.184 port 56463
2019-06-26T07:19:51.128923scmdmz1 sshd\[13485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.76.184
2019-06-26T07:19:53.690688scmdmz1 sshd\[13485\]: Failed password for invalid user lionel from 123.206.76.184 port 56463 ssh2
...
2019-06-26 16:31:44
14.162.146.2 attackbotsspam
Unauthorized connection attempt from IP address 14.162.146.2 on Port 445(SMB)
2019-06-26 16:26:46
182.52.67.37 attack
Honeypot attack, port: 445, PTR: node-d9h.pool-182-52.dynamic.totinternet.net.
2019-06-26 16:19:32
185.176.27.34 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-06-26 16:00:17
122.169.202.83 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 02:04:30,814 INFO [amun_request_handler] PortScan Detected on Port: 445 (122.169.202.83)
2019-06-26 16:19:11
123.252.235.130 attack
445/tcp 445/tcp 445/tcp...
[2019-05-08/06-26]5pkt,1pt.(tcp)
2019-06-26 16:50:39
66.70.130.148 attackbots
Jun 26 07:36:11 core01 sshd\[8117\]: Invalid user villepinte from 66.70.130.148 port 36748
Jun 26 07:36:11 core01 sshd\[8117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.148
...
2019-06-26 16:44:00
182.253.246.194 attack
Unauthorized connection attempt from IP address 182.253.246.194 on Port 445(SMB)
2019-06-26 16:51:29
99.37.246.236 attack
Brute force attempt
2019-06-26 16:43:29
47.153.53.185 attackbotsspam
Honeypot attack, port: 23, PTR: 47-153-53-185.lsan.ca.frontiernet.net.
2019-06-26 16:18:45
153.127.8.122 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-06-26 16:41:21

Recently Reported IPs

125.158.86.242 227.32.85.246 50.58.30.143 199.150.165.238
32.22.251.69 137.172.138.147 130.213.119.231 184.158.104.92
216.24.238.21 59.65.158.217 152.144.159.21 252.125.56.24
53.207.126.54 7.169.191.29 167.91.148.75 166.101.56.214
123.140.14.252 76.31.142.91 181.35.151.230 59.156.211.193