Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Carleton Place

Region: Ontario

Country: Canada

Internet Service Provider: Bell

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.209.12.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.209.12.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 09:04:11 CST 2025
;; MSG SIZE  rcvd: 106
Host info
52.12.209.216.in-addr.arpa domain name pointer bras-base-clpcon0404w-grc-34-216-209-12-52.dsl.bell.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.12.209.216.in-addr.arpa	name = bras-base-clpcon0404w-grc-34-216-209-12-52.dsl.bell.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.26.98.122 attack
$f2bV_matches
2020-04-18 18:16:20
109.70.100.23 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-04-18 18:29:21
80.82.65.60 attack
Apr 18 11:48:54 debian-2gb-nbg1-2 kernel: \[9462306.796008\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.60 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=17434 PROTO=TCP SPT=45061 DPT=5513 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-18 18:02:25
114.204.218.154 attackbotsspam
2020-04-18T11:07:03.071866librenms sshd[31853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.204.218.154
2020-04-18T11:07:03.069666librenms sshd[31853]: Invalid user ck from 114.204.218.154 port 55131
2020-04-18T11:07:04.981301librenms sshd[31853]: Failed password for invalid user ck from 114.204.218.154 port 55131 ssh2
...
2020-04-18 18:22:15
106.75.10.4 attackspam
SSH Brute-Forcing (server2)
2020-04-18 18:22:33
60.249.198.35 attackbots
trying to access non-authorized port
2020-04-18 18:00:29
58.16.187.26 attackbotsspam
Apr 18 06:02:58 host sshd[12500]: Invalid user wy from 58.16.187.26 port 35750
...
2020-04-18 18:04:47
49.247.193.105 attackspambots
SSH invalid-user multiple login attempts
2020-04-18 17:59:25
118.24.33.38 attack
$f2bV_matches
2020-04-18 17:52:36
200.124.155.34 attackspam
Apr 18 05:51:28 debian-2gb-nbg1-2 kernel: \[9440862.164805\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=200.124.155.34 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=51 ID=23477 PROTO=TCP SPT=56641 DPT=80 WINDOW=16384 RES=0x00 ACK SYN URGP=0
2020-04-18 17:56:47
185.220.101.153 attackspam
CMS (WordPress or Joomla) login attempt.
2020-04-18 18:31:36
70.37.61.89 attack
Wordpress malicious attack:[octablocked]
2020-04-18 18:27:17
111.230.148.82 attackspam
Invalid user cj from 111.230.148.82 port 39566
2020-04-18 18:09:42
117.34.105.42 attack
Target: MSSQL :1433 [Brute-force]
2020-04-18 18:21:54
196.52.43.94 attack
Unauthorized connection attempt detected from IP address 196.52.43.94 to port 9000
2020-04-18 18:12:31

Recently Reported IPs

15.50.106.37 233.107.151.201 239.181.208.125 252.34.66.151
150.131.90.226 233.96.29.71 242.70.149.141 115.232.46.211
116.235.66.88 235.116.114.177 226.140.194.19 81.178.125.72
176.132.93.155 42.11.83.214 217.150.228.199 216.112.118.199
118.44.242.39 97.135.143.12 222.191.227.198 169.161.217.74