Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.101.196.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1159
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.101.196.194.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022401 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 13:27:26 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 194.196.101.252.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.196.101.252.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.172.243.87 attack
Unauthorized connection attempt detected from IP address 121.172.243.87 to port 5555 [J]
2020-02-05 18:13:50
3.6.133.77 attack
Unauthorized connection attempt detected from IP address 3.6.133.77 to port 6380 [J]
2020-02-05 18:27:07
27.65.96.248 attackbotsspam
Unauthorized connection attempt detected from IP address 27.65.96.248 to port 23 [J]
2020-02-05 18:26:06
211.254.214.150 attack
Feb  5 11:37:59 lukav-desktop sshd\[29055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.214.150  user=root
Feb  5 11:38:02 lukav-desktop sshd\[29055\]: Failed password for root from 211.254.214.150 port 49046 ssh2
Feb  5 11:41:13 lukav-desktop sshd\[29146\]: Invalid user ian from 211.254.214.150
Feb  5 11:41:13 lukav-desktop sshd\[29146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.214.150
Feb  5 11:41:15 lukav-desktop sshd\[29146\]: Failed password for invalid user ian from 211.254.214.150 port 45556 ssh2
2020-02-05 18:28:07
119.28.232.240 attackbots
Unauthorized connection attempt detected from IP address 119.28.232.240 to port 4433 [J]
2020-02-05 18:14:31
113.23.33.204 attack
Unauthorized connection attempt detected from IP address 113.23.33.204 to port 23 [J]
2020-02-05 18:14:52
188.133.189.157 attackbotsspam
Unauthorized connection attempt detected from IP address 188.133.189.157 to port 23 [J]
2020-02-05 18:10:21
45.163.134.246 attackspam
Unauthorized connection attempt detected from IP address 45.163.134.246 to port 23 [J]
2020-02-05 18:22:29
42.117.20.255 attackbots
Unauthorized connection attempt detected from IP address 42.117.20.255 to port 23 [J]
2020-02-05 18:24:36
14.35.44.115 attackspambots
Unauthorized connection attempt detected from IP address 14.35.44.115 to port 4567 [J]
2020-02-05 18:51:56
171.213.46.33 attack
Unauthorized connection attempt detected from IP address 171.213.46.33 to port 23 [J]
2020-02-05 18:36:34
199.249.230.89 attackbotsspam
fell into ViewStateTrap:wien2018
2020-02-05 18:08:38
94.198.235.245 attackspambots
Unauthorized connection attempt detected from IP address 94.198.235.245 to port 8080 [J]
2020-02-05 18:45:55
185.187.71.22 attack
Unauthorized connection attempt detected from IP address 185.187.71.22 to port 23 [J]
2020-02-05 18:33:29
189.140.137.99 attackbots
Unauthorized connection attempt detected from IP address 189.140.137.99 to port 80 [J]
2020-02-05 18:10:03

Recently Reported IPs

81.30.162.31 87.153.145.19 136.241.165.116 131.84.175.252
251.192.103.53 74.131.76.184 19.41.115.77 9.3.50.234
119.82.43.3 167.129.193.75 231.194.56.199 151.53.245.89
127.152.223.77 120.181.228.177 143.68.50.7 154.236.139.113
61.184.242.63 49.244.127.196 86.113.214.94 203.248.247.187