Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.149.201.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41183
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.149.201.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 03:31:03 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 252.201.149.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.201.149.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.229.24.194 attack
Sep  6 10:52:12 abendstille sshd\[30629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.229.24.194  user=root
Sep  6 10:52:14 abendstille sshd\[30629\]: Failed password for root from 186.229.24.194 port 60161 ssh2
Sep  6 10:58:03 abendstille sshd\[3444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.229.24.194  user=root
Sep  6 10:58:05 abendstille sshd\[3444\]: Failed password for root from 186.229.24.194 port 62113 ssh2
Sep  6 10:59:57 abendstille sshd\[5111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.229.24.194  user=root
...
2020-09-07 02:54:01
212.33.199.121 attack
SSH Brute-Forcing (server1)
2020-09-07 03:10:18
190.39.103.139 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 03:01:36
185.220.101.216 attack
Multiple SSH authentication failures from 185.220.101.216
2020-09-07 03:03:40
142.93.73.89 attackbots
Attempting to access Wordpress login on a honeypot or private system.
2020-09-07 03:19:18
83.146.97.13 attackbots
Icarus honeypot on github
2020-09-07 02:55:16
137.59.110.53 attackbotsspam
...
2020-09-07 02:50:38
112.134.220.130 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 02:49:04
94.102.49.159 attackbots
[MK-VM4] Blocked by UFW
2020-09-07 03:11:43
67.60.146.182 attackbotsspam
Honeypot attack, port: 445, PTR: 67-60-146-182.cpe.sparklight.net.
2020-09-07 02:53:46
222.186.175.148 attack
Sep  6 21:17:19 PorscheCustomer sshd[4592]: Failed password for root from 222.186.175.148 port 65506 ssh2
Sep  6 21:17:32 PorscheCustomer sshd[4592]: error: maximum authentication attempts exceeded for root from 222.186.175.148 port 65506 ssh2 [preauth]
Sep  6 21:17:38 PorscheCustomer sshd[4596]: Failed password for root from 222.186.175.148 port 15442 ssh2
...
2020-09-07 03:21:18
87.255.97.226 attack
Port scan on 1 port(s): 8080
2020-09-07 03:18:03
34.96.223.183 attack
 TCP (SYN) 34.96.223.183:55194 -> port 23, len 44
2020-09-07 03:14:19
82.131.209.179 attackbots
reported through recidive - multiple failed attempts(SSH)
2020-09-07 02:44:45
201.243.196.104 attack
Honeypot attack, port: 445, PTR: 201-243-196-104.dyn.dsl.cantv.net.
2020-09-07 03:10:45

Recently Reported IPs

235.58.139.157 107.16.82.35 148.130.105.188 3.197.239.71
195.66.180.72 168.115.45.17 6.94.157.154 40.220.111.174
8.170.44.55 197.27.202.136 49.200.148.12 152.53.74.33
22.37.45.56 56.233.34.135 185.65.183.102 68.63.165.210
61.130.10.88 180.242.181.254 124.115.45.77 46.136.150.9