Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yerevan

Region: Yerevan

Country: Armenia

Internet Service Provider: Ucom LLC

Hostname: unknown

Organization: Ucom LLC

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
spam
2020-08-17 14:56:41
attack
Dovecot Invalid User Login Attempt.
2020-08-09 04:05:07
attackbots
37.252.64.48 has been banned for [spam]
...
2020-05-22 21:44:50
attackspam
email spam
2020-04-15 16:21:35
attackbotsspam
spam
2020-01-24 17:28:41
attack
2020-01-22 00:56:28 H=(host-48.64.252.37.ucom.am) [37.252.64.48]:43280 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.11, 127.0.0.4) (https://www.spamhaus.org/query/ip/37.252.64.48)
2020-01-22 00:56:29 H=(host-48.64.252.37.ucom.am) [37.252.64.48]:43280 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4, 127.0.0.11) (https://www.spamhaus.org/query/ip/37.252.64.48)
2020-01-22 00:56:29 H=(host-48.64.252.37.ucom.am) [37.252.64.48]:43280 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4, 127.0.0.11) (https://www.spamhaus.org/query/ip/37.252.64.48)
...
2020-01-22 17:50:12
attack
37.252.64.48 has been banned for [spam]
...
2020-01-04 22:47:49
attackbots
SPF Fail sender not permitted to send mail for @ucom.am / Spam to target mail address hacked/leaked/bought from Kachingle
2019-12-19 20:49:40
attackspam
proto=tcp  .  spt=56002  .  dpt=25  .     (Found on   Blocklist de  Oct 13)     (779)
2019-10-14 06:49:28
Comments on same subnet:
IP Type Details Datetime
37.252.64.51 attackbotsspam
port 23
2020-06-25 20:09:38
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 37.252.64.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42580
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;37.252.64.48.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 29 21:07:47 +08 2019
;; MSG SIZE  rcvd: 116

Host info
48.64.252.37.in-addr.arpa domain name pointer host-48.64.252.37.ucom.am.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
48.64.252.37.in-addr.arpa	name = host-48.64.252.37.ucom.am.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
185.103.51.85 attackspam
Jun  1 17:15:05 vmd17057 sshd[26425]: Failed password for root from 185.103.51.85 port 37790 ssh2
...
2020-06-02 03:38:00
117.4.31.86 attack
Unauthorized connection attempt from IP address 117.4.31.86 on Port 445(SMB)
2020-06-02 03:15:03
157.230.2.208 attack
$f2bV_matches
2020-06-02 03:39:16
212.92.124.161 attack
0,09-01/09 [bc02/m63] PostRequest-Spammer scoring: Durban01
2020-06-02 03:45:53
139.59.64.189 attackbots
CMS (WordPress or Joomla) login attempt.
2020-06-02 03:49:02
101.132.71.106 attackbots
ddos attack
2020-06-02 03:23:39
62.60.194.243 attackspam
Unauthorized connection attempt from IP address 62.60.194.243 on Port 445(SMB)
2020-06-02 03:13:08
219.87.82.116 attackspam
Unauthorized connection attempt from IP address 219.87.82.116 on Port 445(SMB)
2020-06-02 03:40:19
104.248.88.100 attack
CMS (WordPress or Joomla) login attempt.
2020-06-02 03:20:49
114.32.55.102 attackspam
Jun  1 18:11:39 marvibiene sshd[5217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.55.102  user=root
Jun  1 18:11:41 marvibiene sshd[5217]: Failed password for root from 114.32.55.102 port 52648 ssh2
Jun  1 18:14:39 marvibiene sshd[5243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.55.102  user=root
Jun  1 18:14:42 marvibiene sshd[5243]: Failed password for root from 114.32.55.102 port 33038 ssh2
...
2020-06-02 03:50:26
40.72.97.22 attack
failed root login
2020-06-02 03:18:02
190.138.48.6 attackspambots
Automatic report - Port Scan Attack
2020-06-02 03:18:31
79.113.91.204 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-06-02 03:30:27
82.64.60.90 attack
Fail2Ban - SSH Bruteforce Attempt
2020-06-02 03:34:00
193.112.135.146 attack
fail2ban -- 193.112.135.146
...
2020-06-02 03:36:57

Recently Reported IPs

183.99.87.90 53.185.5.210 199.251.80.48 23.247.77.114
39.147.3.13 176.42.156.40 191.102.199.201 108.189.242.213
116.73.172.29 13.235.178.228 190.6.4.122 200.210.207.56
31.148.123.245 82.5.55.38 185.180.199.69 106.23.193.148
120.72.21.94 204.227.140.116 209.125.114.105 68.183.88.78