Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.40.242.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12646
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.40.242.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 20:45:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 19.242.40.252.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.242.40.252.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.16.96.37 attackbotsspam
$f2bV_matches
2019-11-07 22:53:14
5.189.162.164 attackspambots
masscan
2019-11-07 23:07:05
95.52.41.255 attack
Chat Spam
2019-11-07 23:09:15
142.93.18.7 attackbotsspam
142.93.18.7 - - [07/Nov/2019:15:48:10 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.7 - - [07/Nov/2019:15:48:10 +0100] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.7 - - [07/Nov/2019:15:48:16 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.7 - - [07/Nov/2019:15:48:16 +0100] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.7 - - [07/Nov/2019:15:48:21 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.7 - - [07/Nov/2019:15:48:22 +0100] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-07 23:27:32
185.222.58.140 attack
Multiple Wordpress attacks.

Attempt to access
- //oldsite/wp-admin/install.php
- //new/wp-admin/install.php
- //blog/wp-admin/install.php
- ///wp-admin/install.php
- etc.
2019-11-07 23:13:51
222.186.175.183 attackbotsspam
Nov  7 09:52:04 TORMINT sshd\[12208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Nov  7 09:52:06 TORMINT sshd\[12208\]: Failed password for root from 222.186.175.183 port 17790 ssh2
Nov  7 09:52:10 TORMINT sshd\[12208\]: Failed password for root from 222.186.175.183 port 17790 ssh2
...
2019-11-07 22:56:15
165.22.61.82 attackbotsspam
Nov  7 16:01:33 srv01 sshd[558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.61.82  user=root
Nov  7 16:01:36 srv01 sshd[558]: Failed password for root from 165.22.61.82 port 56190 ssh2
Nov  7 16:05:59 srv01 sshd[746]: Invalid user admin from 165.22.61.82
Nov  7 16:05:59 srv01 sshd[746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.61.82
Nov  7 16:05:59 srv01 sshd[746]: Invalid user admin from 165.22.61.82
Nov  7 16:06:02 srv01 sshd[746]: Failed password for invalid user admin from 165.22.61.82 port 37514 ssh2
...
2019-11-07 23:18:51
45.143.220.56 attackbots
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11-04 x@x
[2019-11........
-------------------------------
2019-11-07 22:50:45
40.78.134.75 attackspambots
07.11.2019 15:49:21 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-11-07 22:58:25
138.197.143.221 attackbotsspam
Nov  7 15:49:00 [host] sshd[1537]: Invalid user library from 138.197.143.221
Nov  7 15:49:00 [host] sshd[1537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.143.221
Nov  7 15:49:02 [host] sshd[1537]: Failed password for invalid user library from 138.197.143.221 port 58806 ssh2
2019-11-07 23:02:47
222.186.175.202 attackspam
Nov  7 16:01:22 rotator sshd\[11662\]: Failed password for root from 222.186.175.202 port 64516 ssh2Nov  7 16:01:27 rotator sshd\[11662\]: Failed password for root from 222.186.175.202 port 64516 ssh2Nov  7 16:01:31 rotator sshd\[11662\]: Failed password for root from 222.186.175.202 port 64516 ssh2Nov  7 16:01:36 rotator sshd\[11662\]: Failed password for root from 222.186.175.202 port 64516 ssh2Nov  7 16:01:40 rotator sshd\[11662\]: Failed password for root from 222.186.175.202 port 64516 ssh2Nov  7 16:01:53 rotator sshd\[11665\]: Failed password for root from 222.186.175.202 port 2534 ssh2
...
2019-11-07 23:16:02
45.82.153.42 attackspam
11/07/2019-15:48:19.457222 45.82.153.42 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 44
2019-11-07 23:32:13
197.86.173.225 attackbotsspam
Nov  7 15:48:47 vpn01 sshd[21291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.86.173.225
...
2019-11-07 23:14:31
201.150.5.14 attack
Nov  7 17:48:35 hosting sshd[27318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.150.5.14  user=root
Nov  7 17:48:37 hosting sshd[27318]: Failed password for root from 201.150.5.14 port 36702 ssh2
...
2019-11-07 23:21:47
62.234.148.159 attackspambots
Nov  7 15:48:17 lnxweb62 sshd[20087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.148.159
2019-11-07 23:32:32

Recently Reported IPs

207.158.107.162 166.163.223.144 5.41.8.252 56.119.3.174
91.13.90.111 108.152.232.74 174.29.193.69 232.56.194.161
97.47.106.165 125.111.80.184 195.243.126.106 250.23.156.87
83.48.41.104 232.226.58.113 74.165.143.158 41.172.31.157
6.124.68.90 173.30.59.11 229.228.248.127 141.81.196.69