Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.139.21.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37137
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.139.21.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:13:49 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 195.21.139.252.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.21.139.252.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.152.178.44 attackbots
2020-07-10T17:58:05.5780171495-001 sshd[40649]: Invalid user wilson from 37.152.178.44 port 44842
2020-07-10T17:58:07.9857811495-001 sshd[40649]: Failed password for invalid user wilson from 37.152.178.44 port 44842 ssh2
2020-07-10T18:00:55.5638051495-001 sshd[40766]: Invalid user instrume from 37.152.178.44 port 59362
2020-07-10T18:00:55.5677531495-001 sshd[40766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.178.44
2020-07-10T18:00:55.5638051495-001 sshd[40766]: Invalid user instrume from 37.152.178.44 port 59362
2020-07-10T18:00:57.3097101495-001 sshd[40766]: Failed password for invalid user instrume from 37.152.178.44 port 59362 ssh2
...
2020-07-11 06:58:27
222.244.146.232 attack
Jul 10 17:44:34 george sshd[13161]: Failed password for invalid user cara from 222.244.146.232 port 39460 ssh2
Jul 10 17:45:35 george sshd[13173]: Invalid user claire from 222.244.146.232 port 47507
Jul 10 17:45:35 george sshd[13173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.244.146.232 
Jul 10 17:45:37 george sshd[13173]: Failed password for invalid user claire from 222.244.146.232 port 47507 ssh2
Jul 10 17:46:38 george sshd[13188]: Invalid user marion from 222.244.146.232 port 55559
...
2020-07-11 07:20:58
94.102.51.58 attack
Jul 11 01:22:45 debian-2gb-nbg1-2 kernel: \[16681952.035071\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.58 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=10230 PROTO=TCP SPT=46070 DPT=7093 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-11 07:27:41
85.204.246.240 attackspambots
WordPress XMLRPC scan :: 85.204.246.240 0.036 - [10/Jul/2020:23:05:29  0000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 503 18041 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.90 Safari/537.36 2345Explorer/9.3.2.17331" "HTTP/1.1"
2020-07-11 07:20:13
45.7.138.40 attackbotsspam
Jul 11 00:55:57 debian-2gb-nbg1-2 kernel: \[16680344.641116\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.7.138.40 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=235 ID=30578 PROTO=TCP SPT=50491 DPT=8358 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-11 07:14:58
210.212.237.67 attack
Jul 11 01:39:38 pkdns2 sshd\[48073\]: Invalid user nagasawa from 210.212.237.67Jul 11 01:39:41 pkdns2 sshd\[48073\]: Failed password for invalid user nagasawa from 210.212.237.67 port 33410 ssh2Jul 11 01:43:30 pkdns2 sshd\[48255\]: Invalid user victor from 210.212.237.67Jul 11 01:43:32 pkdns2 sshd\[48255\]: Failed password for invalid user victor from 210.212.237.67 port 58518 ssh2Jul 11 01:47:24 pkdns2 sshd\[48449\]: Invalid user yuyue from 210.212.237.67Jul 11 01:47:26 pkdns2 sshd\[48449\]: Failed password for invalid user yuyue from 210.212.237.67 port 55406 ssh2
...
2020-07-11 07:22:49
142.93.212.213 attack
Multiport scan 22 ports : 395 1331 1688 1815 2029 5154 6749 8960 10502 11103 15833 17077 17576 19920 22376 23285 25732 26097 27376 28104 29057 30484
2020-07-11 07:07:47
49.233.12.108 attackspam
Jul 10 23:45:06 inter-technics sshd[20332]: Invalid user fei from 49.233.12.108 port 48396
Jul 10 23:45:06 inter-technics sshd[20332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.12.108
Jul 10 23:45:06 inter-technics sshd[20332]: Invalid user fei from 49.233.12.108 port 48396
Jul 10 23:45:08 inter-technics sshd[20332]: Failed password for invalid user fei from 49.233.12.108 port 48396 ssh2
Jul 10 23:49:30 inter-technics sshd[20560]: Invalid user taffi from 49.233.12.108 port 40874
...
2020-07-11 06:53:41
37.123.163.106 attack
Jul 10 19:53:48 : SSH login attempts with invalid user
2020-07-11 06:54:04
119.96.87.52 attackspambots
SSH Invalid Login
2020-07-11 07:10:35
99.120.229.5 attackspambots
IP blocked
2020-07-11 07:12:25
123.1.154.200 attackspam
Jul  9 16:25:12 sip sshd[27115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.1.154.200
Jul  9 16:25:14 sip sshd[27115]: Failed password for invalid user gast from 123.1.154.200 port 36583 ssh2
Jul  9 16:34:25 sip sshd[30566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.1.154.200
2020-07-11 06:59:10
112.85.42.180 attack
Jul 10 22:38:14 rush sshd[30171]: Failed password for root from 112.85.42.180 port 32286 ssh2
Jul 10 22:38:27 rush sshd[30171]: error: maximum authentication attempts exceeded for root from 112.85.42.180 port 32286 ssh2 [preauth]
Jul 10 22:38:34 rush sshd[30173]: Failed password for root from 112.85.42.180 port 48840 ssh2
...
2020-07-11 07:28:11
113.141.70.199 attackbotsspam
Invalid user radiusd from 113.141.70.199 port 53634
2020-07-11 07:26:29
123.207.142.208 attackbotsspam
Jul  9 00:56:48 sip sshd[7486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.142.208
Jul  9 00:56:50 sip sshd[7486]: Failed password for invalid user kirk from 123.207.142.208 port 45486 ssh2
Jul  9 00:59:26 sip sshd[8453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.142.208
2020-07-11 06:54:42

Recently Reported IPs

135.224.30.86 196.172.7.101 75.107.92.231 45.44.70.156
172.28.124.91 215.150.108.176 39.178.176.102 15.110.5.251
84.81.129.175 22.45.126.170 139.224.153.123 207.81.138.126
200.152.245.182 74.146.46.150 243.199.197.100 197.215.142.11
253.21.4.35 84.231.13.202 248.153.235.141 247.182.248.13