Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.41.0.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43587
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.41.0.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 21:06:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 252.0.41.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.0.41.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.28.33.170 attackspambots
JP - 1H : (64)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : JP 
 NAME ASN : ASN2514 
 
 IP : 128.28.33.170 
 
 CIDR : 128.28.0.0/16 
 
 PREFIX COUNT : 158 
 
 UNIQUE IP COUNT : 2074624 
 
 
 WYKRYTE ATAKI Z ASN2514 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 3 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-15 22:40:26
92.255.178.230 attack
Sep 15 10:15:10 ny01 sshd[23730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.178.230
Sep 15 10:15:12 ny01 sshd[23730]: Failed password for invalid user appuser from 92.255.178.230 port 39348 ssh2
Sep 15 10:19:57 ny01 sshd[24508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.178.230
2019-09-15 22:35:24
206.81.7.42 attack
Sep 15 04:06:20 tdfoods sshd\[7282\]: Invalid user Access from 206.81.7.42
Sep 15 04:06:20 tdfoods sshd\[7282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.7.42
Sep 15 04:06:21 tdfoods sshd\[7282\]: Failed password for invalid user Access from 206.81.7.42 port 37780 ssh2
Sep 15 04:10:24 tdfoods sshd\[7855\]: Invalid user deploy from 206.81.7.42
Sep 15 04:10:24 tdfoods sshd\[7855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.7.42
2019-09-15 22:39:58
103.56.79.2 attackbotsspam
Sep 15 03:18:12 kapalua sshd\[4334\]: Invalid user lucene from 103.56.79.2
Sep 15 03:18:12 kapalua sshd\[4334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.79.2
Sep 15 03:18:15 kapalua sshd\[4334\]: Failed password for invalid user lucene from 103.56.79.2 port 33819 ssh2
Sep 15 03:22:48 kapalua sshd\[4749\]: Invalid user oz from 103.56.79.2
Sep 15 03:22:48 kapalua sshd\[4749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.79.2
2019-09-15 22:42:40
186.226.227.213 attackspambots
Automatic report - Port Scan Attack
2019-09-15 22:31:06
162.251.23.216 attackbots
10 attempts against mh-pma-try-ban on stem.magehost.pro
2019-09-15 21:59:34
194.102.35.245 attackspam
2019-09-15T14:13:48.172593abusebot-7.cloudsearch.cf sshd\[7780\]: Invalid user ira from 194.102.35.245 port 47650
2019-09-15 22:27:42
168.195.32.4 attackbots
Automatic report - Port Scan Attack
2019-09-15 22:45:56
36.251.140.254 attackspam
SSH scan ::
2019-09-15 22:26:35
49.234.68.13 attackbotsspam
2019-09-15T14:26:10.217297abusebot-6.cloudsearch.cf sshd\[7539\]: Invalid user remi_ext from 49.234.68.13 port 55650
2019-09-15 22:33:38
45.136.109.40 attackbots
Sep 15 15:19:53 mc1 kernel: \[1104145.940097\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.40 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=17774 PROTO=TCP SPT=41944 DPT=8695 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 15 15:21:28 mc1 kernel: \[1104240.207258\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.40 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=42646 PROTO=TCP SPT=41944 DPT=8450 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 15 15:23:07 mc1 kernel: \[1104339.063480\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.40 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=14106 PROTO=TCP SPT=41944 DPT=8630 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-15 22:22:04
185.244.21.209 attackspambots
Excessive Port-Scanning
2019-09-15 22:01:35
51.75.26.106 attackbotsspam
Jan 31 00:49:03 microserver sshd[53889]: Invalid user newuser from 51.75.26.106 port 46856
Jan 31 00:49:03 microserver sshd[53889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.26.106
Jan 31 00:49:06 microserver sshd[53889]: Failed password for invalid user newuser from 51.75.26.106 port 46856 ssh2
Jan 31 00:52:12 microserver sshd[54369]: Invalid user alex from 51.75.26.106 port 43852
Jan 31 00:52:12 microserver sshd[54369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.26.106
Feb  4 09:19:01 microserver sshd[24225]: Invalid user ben from 51.75.26.106 port 54556
Feb  4 09:19:01 microserver sshd[24225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.26.106
Feb  4 09:19:03 microserver sshd[24225]: Failed password for invalid user ben from 51.75.26.106 port 54556 ssh2
Feb  4 09:22:14 microserver sshd[24682]: Invalid user suporte from 51.75.26.106 port 51384
Feb  4 09:22:
2019-09-15 22:25:46
46.101.127.49 attackspam
Sep 15 15:30:51 mail sshd\[8963\]: Failed password for invalid user webmail!@\# from 46.101.127.49 port 47500 ssh2
Sep 15 15:35:42 mail sshd\[9597\]: Invalid user 123 from 46.101.127.49 port 60556
Sep 15 15:35:42 mail sshd\[9597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.127.49
Sep 15 15:35:44 mail sshd\[9597\]: Failed password for invalid user 123 from 46.101.127.49 port 60556 ssh2
Sep 15 15:40:31 mail sshd\[10386\]: Invalid user 1 from 46.101.127.49 port 45376
Sep 15 15:40:31 mail sshd\[10386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.127.49
2019-09-15 21:47:39
189.41.132.121 attackspambots
Automatic report - Port Scan Attack
2019-09-15 21:56:37

Recently Reported IPs

236.27.196.53 220.184.220.104 124.35.146.67 107.149.69.132
168.60.202.166 176.189.110.192 234.131.14.219 255.22.44.24
136.213.165.201 85.173.70.186 22.183.61.211 188.70.252.107
226.93.38.118 128.32.254.153 184.240.160.185 146.191.10.118
42.68.58.68 152.158.131.143 72.48.124.104 138.155.150.146