Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.157.149.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.157.149.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:07:56 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 56.149.157.252.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.149.157.252.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.190.80.90 attack
Chat Spam
2019-10-01 09:18:05
165.227.53.38 attackbots
[Aegis] @ 2019-10-01 04:55:25  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-10-01 12:02:37
49.88.112.90 attackspambots
Oct  1 03:11:26 vpn01 sshd[12777]: Failed password for root from 49.88.112.90 port 57171 ssh2
Oct  1 03:11:28 vpn01 sshd[12777]: Failed password for root from 49.88.112.90 port 57171 ssh2
...
2019-10-01 09:12:03
94.21.243.204 attack
Oct  1 06:51:04 server sshd\[16610\]: User root from 94.21.243.204 not allowed because listed in DenyUsers
Oct  1 06:51:04 server sshd\[16610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.21.243.204  user=root
Oct  1 06:51:06 server sshd\[16610\]: Failed password for invalid user root from 94.21.243.204 port 46114 ssh2
Oct  1 06:55:31 server sshd\[29075\]: User root from 94.21.243.204 not allowed because listed in DenyUsers
Oct  1 06:55:31 server sshd\[29075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.21.243.204  user=root
2019-10-01 12:07:47
175.100.18.45 attack
Automatic report - XMLRPC Attack
2019-10-01 09:05:58
222.186.42.117 attackbots
Oct  1 04:22:28 tuotantolaitos sshd[31735]: Failed password for root from 222.186.42.117 port 20262 ssh2
Oct  1 04:22:31 tuotantolaitos sshd[31735]: Failed password for root from 222.186.42.117 port 20262 ssh2
...
2019-10-01 09:24:54
51.68.220.249 attackspambots
Sep 30 17:49:22 friendsofhawaii sshd\[2381\]: Invalid user david from 51.68.220.249
Sep 30 17:49:22 friendsofhawaii sshd\[2381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=249.ip-51-68-220.eu
Sep 30 17:49:24 friendsofhawaii sshd\[2381\]: Failed password for invalid user david from 51.68.220.249 port 50962 ssh2
Sep 30 17:55:30 friendsofhawaii sshd\[2898\]: Invalid user design from 51.68.220.249
Sep 30 17:55:30 friendsofhawaii sshd\[2898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=249.ip-51-68-220.eu
2019-10-01 12:09:45
36.227.77.136 attack
Port scan
2019-10-01 09:28:04
45.238.208.6 attack
Autoban   45.238.208.6 AUTH/CONNECT
2019-10-01 09:12:31
92.188.124.228 attackbots
2019-10-01T03:54:58.757704tmaserv sshd\[5049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228
2019-10-01T03:55:01.026762tmaserv sshd\[5049\]: Failed password for invalid user chef from 92.188.124.228 port 41076 ssh2
2019-10-01T04:11:21.037393tmaserv sshd\[6182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228  user=halt
2019-10-01T04:11:23.256175tmaserv sshd\[6182\]: Failed password for halt from 92.188.124.228 port 37264 ssh2
2019-10-01T04:19:31.428765tmaserv sshd\[6723\]: Invalid user postgres from 92.188.124.228 port 48022
2019-10-01T04:19:31.431438tmaserv sshd\[6723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228
...
2019-10-01 09:20:57
178.62.103.95 attackspam
Oct  1 03:50:26 game-panel sshd[12413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.103.95
Oct  1 03:50:28 game-panel sshd[12413]: Failed password for invalid user db2inst1 from 178.62.103.95 port 33423 ssh2
Oct  1 03:55:30 game-panel sshd[12629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.103.95
2019-10-01 12:10:16
192.236.208.235 attackbotsspam
Oct  1 02:26:09 DAAP sshd[23330]: Invalid user bs from 192.236.208.235 port 43348
Oct  1 02:26:09 DAAP sshd[23330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.236.208.235
Oct  1 02:26:09 DAAP sshd[23330]: Invalid user bs from 192.236.208.235 port 43348
Oct  1 02:26:11 DAAP sshd[23330]: Failed password for invalid user bs from 192.236.208.235 port 43348 ssh2
Oct  1 02:29:35 DAAP sshd[23355]: Invalid user ubstep from 192.236.208.235 port 56224
...
2019-10-01 09:22:19
123.136.161.146 attackbots
Oct  1 06:56:06 www sshd\[14501\]: Invalid user rob from 123.136.161.146
Oct  1 06:56:06 www sshd\[14501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.136.161.146
Oct  1 06:56:09 www sshd\[14501\]: Failed password for invalid user rob from 123.136.161.146 port 35052 ssh2
...
2019-10-01 12:06:30
59.1.116.20 attackbotsspam
Oct  1 01:04:07 XXX sshd[55345]: Invalid user user from 59.1.116.20 port 58464
2019-10-01 09:20:08
109.203.101.166 attack
WordPress wp-login brute force :: 109.203.101.166 3.116 BYPASS [01/Oct/2019:08:51:41  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-01 09:19:02

Recently Reported IPs

86.13.185.14 157.8.105.19 140.141.40.199 13.48.168.2
26.99.77.216 120.234.161.153 222.37.53.207 238.120.163.39
118.218.168.240 76.186.69.40 24.57.160.218 49.52.145.137
12.17.240.44 250.109.139.152 165.56.142.150 178.117.211.46
160.82.86.223 54.120.239.153 99.102.215.111 55.33.96.127