Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.0.52.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.0.52.122.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025060602 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 07 10:57:24 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 122.52.0.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 122.52.0.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.102.49.190 attack
[Sat Apr 18 11:53:56 2020] - DDoS Attack From IP: 94.102.49.190 Port: 24858
2020-05-03 07:14:31
80.211.245.129 attackbotsspam
$f2bV_matches
2020-05-03 07:39:00
89.248.160.178 attackbots
Triggered: repeated knocking on closed ports.
2020-05-03 07:17:02
5.102.4.44 attackbotsspam
May  2 22:33:44 icecube postfix/smtpd[23198]: NOQUEUE: reject: RCPT from unknown[5.102.4.44]: 554 5.7.1 Service unavailable; Client host [5.102.4.44] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/5.102.4.44; from= to= proto=ESMTP helo=<[5.102.4.44]>
2020-05-03 07:47:32
66.249.155.245 attack
Invalid user postgres from 66.249.155.245 port 55642
2020-05-03 07:48:21
80.82.78.20 attackspambots
05/02/2020-18:44:06.059989 80.82.78.20 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-03 07:20:47
45.55.32.34 attackbotsspam
Invalid user upload from 45.55.32.34 port 55281
2020-05-03 07:31:23
49.232.168.32 attackspambots
2020-05-02T18:33:30.5576091495-001 sshd[57737]: Failed password for root from 49.232.168.32 port 40838 ssh2
2020-05-02T18:36:07.6882841495-001 sshd[57815]: Invalid user lui from 49.232.168.32 port 40428
2020-05-02T18:36:07.6916081495-001 sshd[57815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.168.32
2020-05-02T18:36:07.6882841495-001 sshd[57815]: Invalid user lui from 49.232.168.32 port 40428
2020-05-02T18:36:09.5271731495-001 sshd[57815]: Failed password for invalid user lui from 49.232.168.32 port 40428 ssh2
2020-05-02T18:38:42.0392941495-001 sshd[57873]: Invalid user cuenca from 49.232.168.32 port 40016
...
2020-05-03 07:41:06
103.248.83.226 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 96 - port: 28971 proto: TCP cat: Misc Attack
2020-05-03 07:12:02
106.54.245.12 attack
May  3 00:25:28 home sshd[8765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.245.12
May  3 00:25:30 home sshd[8765]: Failed password for invalid user wordpress from 106.54.245.12 port 40546 ssh2
May  3 00:30:38 home sshd[9522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.245.12
...
2020-05-03 07:38:43
87.251.74.240 attackbots
firewall-block, port(s): 7773/tcp, 9954/tcp, 10022/tcp, 29999/tcp, 40100/tcp, 59595/tcp
2020-05-03 07:18:45
87.251.74.59 attackspambots
05/02/2020-18:45:27.507159 87.251.74.59 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-03 07:19:12
87.251.74.243 attackbots
Multiport scan : 29 ports scanned 1054 1074 1076 1717 1919 1981 2626 3170 3371 3420 4013 5090 5522 6010 6611 8060 8520 8580 9085 10495 10625 10950 25025 25152 31313 40804 47047 51051 64064
2020-05-03 07:18:05
80.82.65.62 attack
05/02/2020-18:34:23.061247 80.82.65.62 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-03 07:23:32
222.186.30.76 attackbotsspam
May  2 23:36:02 scw-6657dc sshd[12811]: Failed password for root from 222.186.30.76 port 54005 ssh2
May  2 23:36:02 scw-6657dc sshd[12811]: Failed password for root from 222.186.30.76 port 54005 ssh2
May  2 23:36:04 scw-6657dc sshd[12811]: Failed password for root from 222.186.30.76 port 54005 ssh2
...
2020-05-03 07:41:44

Recently Reported IPs

135.119.97.34 35.203.210.240 223.111.128.42 20.171.207.72
4.227.36.3 39.163.56.136 39.154.11.178 205.210.31.129
204.76.203.234 183.250.51.132 111.9.202.4 111.18.4.8
28.14.4.63 192.168.3.16 35.203.210.5 206.168.34.214
206.168.34.201 199.45.154.130 51.159.99.244 113.215.188.69