Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 243.116.139.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;243.116.139.252.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 05:26:44 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 252.139.116.243.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.139.116.243.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
2001:ad0:1000:1001::143 attack
GET /wp-admin/network/site-new.php
2019-12-15 01:45:16
68.183.234.160 attackbots
(mod_security) mod_security (id:920170) triggered by 68.183.234.160 (SG/Singapore/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: [Sat Dec 14 10:50:32.575118 2019] [:error] [pid 65819:tid 47884326278912] [client 68.183.234.160:14224] [client 68.183.234.160] ModSecurity: Access denied with code 403 (phase 2). Match of "rx ^0?$" against "REQUEST_HEADERS:Content-Length" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "143"] [id "920170"] [rev "1"] [msg "GET or HEAD Request with Body Content."] [data "19058"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "9"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "cjthedj97.me"] [uri "/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php"] [unique_id "XfUEyDP6KGgpsQxizTF8PgAAAJc"]
2019-12-15 01:39:21
185.244.39.205 attackspambots
Dec 14 17:52:04 * sshd[848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.39.205
Dec 14 17:52:06 * sshd[848]: Failed password for invalid user dux from 185.244.39.205 port 35462 ssh2
2019-12-15 01:56:01
109.70.100.27 attack
GET /.bitcoin/wallet.dat
2019-12-15 01:50:23
2a02:27ab:0:2::5ea attackbotsspam
GET /wp-admin/network/site-new.php
2019-12-15 01:41:56
193.169.255.130 attackbots
Excessive requests, port scanning.  No user agent.
2019-12-15 01:31:34
198.245.49.22 attackbots
PHI,WP GET /wp-login.php
2019-12-15 01:30:34
31.202.101.40 attackspambots
XMLRPC script access attempt: "GET /xmlrpc.php"
2019-12-15 01:45:37
154.209.253.149 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 544c6689cd0184d0 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: HK | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: skk.moe | User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) | CF_DC: HKG. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-15 01:49:13
14.175.176.73 attack
Brute forcing RDP port 3389
2019-12-15 01:55:10
47.74.230.86 attackspam
Invalid user electra from 47.74.230.86 port 49854
2019-12-15 01:53:32
189.41.68.221 attackbotsspam
Lines containing failures of 189.41.68.221
Dec 14 09:13:14 smtp-out sshd[22946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.41.68.221  user=r.r
Dec 14 09:13:16 smtp-out sshd[22946]: Failed password for r.r from 189.41.68.221 port 43592 ssh2
Dec 14 09:13:16 smtp-out sshd[22946]: Received disconnect from 189.41.68.221 port 43592:11: Bye Bye [preauth]
Dec 14 09:13:16 smtp-out sshd[22946]: Disconnected from authenticating user r.r 189.41.68.221 port 43592 [preauth]
Dec 14 09:28:06 smtp-out sshd[23452]: Invalid user tsz from 189.41.68.221 port 51716
Dec 14 09:28:06 smtp-out sshd[23452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.41.68.221 
Dec 14 09:28:07 smtp-out sshd[23452]: Failed password for invalid user tsz from 189.41.68.221 port 51716 ssh2
Dec 14 09:28:09 smtp-out sshd[23452]: Received disconnect from 189.41.68.221 port 51716:11: Bye Bye [preauth]
Dec 14 09:28:09 smtp-out........
------------------------------
2019-12-15 01:28:33
223.27.158.44 attackspambots
/blog/wp-includes/wlwmanifest.xml
/cms/wp-includes/wlwmanifest.xml
/site/wp-includes/wlwmanifest.xml
/wordpress/wp-includes/wlwmanifest.xml
/wp/wp-includes/wlwmanifest.xml
/wp-includes/wlwmanifest.xml
/xmlrpc.php?rsd
2019-12-15 01:29:26
158.174.122.199 attack
158.174.122.199 - - [13/Dec/2019:22:24:31 +0200] "GET /backup/backup.dat HTTP/1.1" 404 196 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36"
2019-12-15 01:48:41
222.173.81.22 attack
Dec 14 18:12:34 serwer sshd\[18884\]: Invalid user claire from 222.173.81.22 port 10968
Dec 14 18:12:34 serwer sshd\[18884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.173.81.22
Dec 14 18:12:37 serwer sshd\[18884\]: Failed password for invalid user claire from 222.173.81.22 port 10968 ssh2
...
2019-12-15 01:58:07

Recently Reported IPs

28.217.45.33 96.212.228.240 186.66.60.215 12.130.162.236
150.53.101.182 144.182.244.198 50.5.97.124 179.224.27.9
212.94.26.190 221.80.170.53 28.205.174.40 67.166.132.58
217.105.235.67 100.59.160.44 144.134.36.22 171.89.41.155
38.137.92.133 5.78.57.22 45.112.253.173 39.33.184.69