Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.201.140.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.201.140.221.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 23:17:32 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 221.140.201.252.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.140.201.252.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.116.187.80 attackspambots
23/tcp
[2019-10-26]1pkt
2019-10-26 17:18:06
94.23.198.73 attackspambots
Oct 25 22:50:06 php1 sshd\[11847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.198.73  user=root
Oct 25 22:50:07 php1 sshd\[11847\]: Failed password for root from 94.23.198.73 port 42107 ssh2
Oct 25 22:57:55 php1 sshd\[12475\]: Invalid user 336 from 94.23.198.73
Oct 25 22:57:55 php1 sshd\[12475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.198.73
Oct 25 22:57:57 php1 sshd\[12475\]: Failed password for invalid user 336 from 94.23.198.73 port 32970 ssh2
2019-10-26 17:47:12
64.34.30.163 attackbotsspam
2019-10-26T07:20:31.533365homeassistant sshd[3590]: Invalid user tstuser from 64.34.30.163 port 51332
2019-10-26T07:20:31.539510homeassistant sshd[3590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.34.30.163
...
2019-10-26 17:33:52
46.173.55.27 attackbots
Automatic report - Banned IP Access
2019-10-26 17:17:06
115.238.236.74 attackspambots
Oct 26 11:32:36 meumeu sshd[13822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74 
Oct 26 11:32:37 meumeu sshd[13822]: Failed password for invalid user sdtdserver from 115.238.236.74 port 35112 ssh2
Oct 26 11:38:03 meumeu sshd[14352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74 
...
2019-10-26 17:43:11
82.196.3.212 attackbots
[26/Oct/2019:05:46:12 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-26 17:51:45
52.192.73.251 attack
WordPress wp-login brute force :: 52.192.73.251 0.052 BYPASS [26/Oct/2019:18:12:24  1100] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4634 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36"
2019-10-26 17:16:15
2.224.171.34 attack
Fail2Ban Ban Triggered
2019-10-26 17:30:22
27.100.26.165 attackbots
Oct 26 10:54:15 MK-Soft-VM4 sshd[11821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.100.26.165 
Oct 26 10:54:18 MK-Soft-VM4 sshd[11821]: Failed password for invalid user applmgr from 27.100.26.165 port 52998 ssh2
...
2019-10-26 17:29:52
209.205.217.210 attackbotsspam
Oct 26 09:32:19 unicornsoft sshd\[6035\]: Invalid user ubuntu from 209.205.217.210
Oct 26 09:32:19 unicornsoft sshd\[6035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.205.217.210
Oct 26 09:32:21 unicornsoft sshd\[6035\]: Failed password for invalid user ubuntu from 209.205.217.210 port 45458 ssh2
2019-10-26 17:36:46
103.197.93.2 attackbots
proto=tcp  .  spt=50711  .  dpt=25  .     (Found on   Blocklist de  Oct 25)     (208)
2019-10-26 17:49:12
151.80.140.166 attackspambots
Oct 26 12:22:01 hosting sshd[20954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dev.geronimo-dev.ovh  user=root
Oct 26 12:22:04 hosting sshd[20954]: Failed password for root from 151.80.140.166 port 40530 ssh2
...
2019-10-26 17:23:10
200.43.77.19 attackbots
email spam
2019-10-26 17:28:30
49.116.215.162 attackbotsspam
23/tcp
[2019-10-26]1pkt
2019-10-26 17:25:19
62.234.146.45 attackspam
2019-10-26T06:41:54.268768  sshd[25063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45  user=root
2019-10-26T06:41:56.492606  sshd[25063]: Failed password for root from 62.234.146.45 port 57320 ssh2
2019-10-26T07:08:12.047499  sshd[25435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45  user=root
2019-10-26T07:08:14.236091  sshd[25435]: Failed password for root from 62.234.146.45 port 60114 ssh2
2019-10-26T07:13:17.693978  sshd[25476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45  user=mysql
2019-10-26T07:13:19.084962  sshd[25476]: Failed password for mysql from 62.234.146.45 port 40324 ssh2
...
2019-10-26 17:20:46

Recently Reported IPs

40.235.171.153 93.58.79.193 189.15.141.152 68.137.102.60
137.25.174.192 176.136.214.137 116.180.158.111 115.51.65.135
45.24.229.32 14.144.148.207 144.37.134.155 186.180.224.225
71.32.23.4 4.18.184.58 236.141.88.24 146.94.124.212
3.7.244.189 174.46.174.250 221.213.143.162 125.182.145.0