Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.51.140.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.51.140.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 23:20:27 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 81.140.51.252.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.140.51.252.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.84.117.222 attack
www.fahrschule-mihm.de 93.84.117.222 \[19/Jul/2019:18:33:21 +0200\] "POST /wp-login.php HTTP/1.1" 200 5757 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.fahrschule-mihm.de 93.84.117.222 \[19/Jul/2019:18:33:26 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4106 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-20 08:54:30
104.41.147.212 attackbots
Too many connections or unauthorized access detected from Yankee banned ip
2019-07-20 09:07:07
178.128.217.47 attackbotsspam
WordPress XMLRPC scan :: 178.128.217.47 0.120 BYPASS [20/Jul/2019:07:39:33  1000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-20 09:08:01
146.115.119.61 attackbots
Jul 14 16:09:52 vpxxxxxxx22308 sshd[5848]: Invalid user tester from 146.115.119.61
Jul 14 16:09:52 vpxxxxxxx22308 sshd[5848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.115.119.61
Jul 14 16:09:54 vpxxxxxxx22308 sshd[5848]: Failed password for invalid user tester from 146.115.119.61 port 58770 ssh2
Jul 14 16:19:37 vpxxxxxxx22308 sshd[8210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.115.119.61  user=r.r
Jul 14 16:19:39 vpxxxxxxx22308 sshd[8210]: Failed password for r.r from 146.115.119.61 port 34300 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=146.115.119.61
2019-07-20 08:57:08
108.161.136.82 attackbotsspam
WP_xmlrpc_attack
2019-07-20 09:37:00
69.30.213.202 attack
Automatic report - Banned IP Access
2019-07-20 09:03:54
120.52.152.17 attackspam
Automatic report - Port Scan Attack
2019-07-20 09:12:16
145.239.89.243 attackbotsspam
Jul 15 12:29:25 vl01 sshd[25036]: Invalid user master from 145.239.89.243
Jul 15 12:29:28 vl01 sshd[25036]: Failed password for invalid user master from 145.239.89.243 port 42920 ssh2
Jul 15 12:29:28 vl01 sshd[25036]: Received disconnect from 145.239.89.243: 11: Bye Bye [preauth]
Jul 15 12:38:08 vl01 sshd[25754]: Invalid user ttest from 145.239.89.243
Jul 15 12:38:11 vl01 sshd[25754]: Failed password for invalid user ttest from 145.239.89.243 port 58766 ssh2
Jul 15 12:38:11 vl01 sshd[25754]: Received disconnect from 145.239.89.243: 11: Bye Bye [preauth]
Jul 15 12:42:35 vl01 sshd[26174]: Invalid user postgres from 145.239.89.243
Jul 15 12:42:37 vl01 sshd[26174]: Failed password for invalid user postgres from 145.239.89.243 port 55788 ssh2
Jul 15 12:42:37 vl01 sshd[26174]: Received disconnect from 145.239.89.243: 11: Bye Bye [preauth]
Jul 15 12:46:52 vl01 sshd[26565]: Invalid user gilles from 145.239.89.243
Jul 15 12:46:54 vl01 sshd[26565]: Failed password for invalid use........
-------------------------------
2019-07-20 09:00:17
183.249.242.103 attack
Jul 19 21:37:14 srv-4 sshd\[29335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.249.242.103  user=postgres
Jul 19 21:37:16 srv-4 sshd\[29335\]: Failed password for postgres from 183.249.242.103 port 50966 ssh2
Jul 19 21:40:08 srv-4 sshd\[29613\]: Invalid user user from 183.249.242.103
Jul 19 21:40:08 srv-4 sshd\[29613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.249.242.103
...
2019-07-20 09:18:55
183.82.112.85 attackbots
Jul 20 02:35:20 eventyay sshd[9269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.112.85
Jul 20 02:35:22 eventyay sshd[9269]: Failed password for invalid user dstserver from 183.82.112.85 port 61600 ssh2
Jul 20 02:40:40 eventyay sshd[10564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.112.85
...
2019-07-20 08:54:00
62.209.230.202 attack
Too many connections or unauthorized access detected from Oscar banned ip
2019-07-20 09:09:12
146.185.130.101 attackspambots
Jul 19 21:06:17 TORMINT sshd\[19635\]: Invalid user usuario from 146.185.130.101
Jul 19 21:06:17 TORMINT sshd\[19635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.130.101
Jul 19 21:06:19 TORMINT sshd\[19635\]: Failed password for invalid user usuario from 146.185.130.101 port 53440 ssh2
...
2019-07-20 09:28:11
210.212.240.234 attackspam
Jul 20 02:59:49 mail sshd\[13888\]: Invalid user www from 210.212.240.234 port 49088
Jul 20 02:59:49 mail sshd\[13888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.240.234
Jul 20 02:59:51 mail sshd\[13888\]: Failed password for invalid user www from 210.212.240.234 port 49088 ssh2
Jul 20 03:05:46 mail sshd\[15233\]: Invalid user ftptest from 210.212.240.234 port 45778
Jul 20 03:05:46 mail sshd\[15233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.240.234
2019-07-20 09:23:29
144.76.99.215 attack
20 attempts against mh-misbehave-ban on milky.magehost.pro
2019-07-20 09:20:27
45.55.157.147 attack
2019-07-20T00:54:34.078351abusebot-5.cloudsearch.cf sshd\[14367\]: Invalid user ppppp from 45.55.157.147 port 43263
2019-07-20 09:18:37

Recently Reported IPs

104.188.206.185 107.169.168.94 152.185.153.235 129.253.89.64
187.196.15.125 120.253.166.192 35.122.210.188 134.160.62.101
86.161.156.155 140.157.139.33 39.44.138.35 18.104.161.39
163.145.184.222 63.255.146.99 134.100.96.82 6.191.250.222
148.216.212.184 253.4.246.158 153.22.151.118 56.213.92.229