Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.252.180.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.252.180.52.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 10:48:26 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 52.180.252.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.180.252.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.113.180.111 attack
37.113.180.111 - - \[30/Oct/2019:12:48:37 +0100\] "GET http://chekfast.zennolab.com/proxy.php HTTP/1.1" 404 47 "RefererString" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\; rv:45.0\) Gecko/20100101 Firefox/45.0"
...
2019-10-31 01:42:21
157.245.145.243 attackbotsspam
Invalid user cloudtest from 157.245.145.243 port 56034
2019-10-31 01:38:16
5.188.154.116 attackbots
RDPBruteVIL
2019-10-31 01:06:18
23.129.64.188 attackbotsspam
Oct 30 18:20:52 vpn01 sshd[11748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.188
Oct 30 18:20:54 vpn01 sshd[11748]: Failed password for invalid user 22 from 23.129.64.188 port 39539 ssh2
...
2019-10-31 01:28:59
128.199.154.60 attackspam
Automatic report - Banned IP Access
2019-10-31 01:01:51
91.121.67.107 attackbotsspam
Oct 30 16:25:17 SilenceServices sshd[17407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.67.107
Oct 30 16:25:19 SilenceServices sshd[17407]: Failed password for invalid user owner from 91.121.67.107 port 44904 ssh2
Oct 30 16:29:26 SilenceServices sshd[20020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.67.107
2019-10-31 01:33:12
104.248.199.34 attack
Here more information about 104.248.199.34 
info: [Netherlands] 14061 DighostnamealOcean, LLC 
Connected: 49 servere(s) 
Reason: ssh 
Ports: 23 
Services: telnet 
servere: Europe/Moscow (UTC+3) 
Found at blocklist: abuseat.org, abuseIPDB.com
myIP:89.179.244.250 
 
[2019-10-28 07:11:48] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:13:53] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:14:17] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:14:32] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:19:28] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:20:27] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:20:30] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:21:10] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:21:30] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:22:21] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:22:27] (tcp) myIP:23 <- 104.248.199.34:55592
[2019-10-28 07:24:08] (tcp) myIP:23 <- 104.248.199.34:555........
---------------------------------
2019-10-31 01:10:59
77.247.110.173 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 67 - port: 51421 proto: TCP cat: Misc Attack
2019-10-31 00:54:52
113.125.41.217 attack
Automatic report - Banned IP Access
2019-10-31 01:19:57
129.211.56.92 attackspam
Automatic report - Banned IP Access
2019-10-31 01:13:40
90.208.214.178 attack
Chat Spam
2019-10-31 01:30:23
58.219.127.217 attackbots
Oct 30 07:48:58 esmtp postfix/smtpd[2798]: lost connection after AUTH from unknown[58.219.127.217]
Oct 30 07:49:00 esmtp postfix/smtpd[2798]: lost connection after AUTH from unknown[58.219.127.217]
Oct 30 07:49:05 esmtp postfix/smtpd[2783]: lost connection after AUTH from unknown[58.219.127.217]
Oct 30 07:49:08 esmtp postfix/smtpd[2783]: lost connection after AUTH from unknown[58.219.127.217]
Oct 30 07:49:10 esmtp postfix/smtpd[2783]: lost connection after AUTH from unknown[58.219.127.217]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=58.219.127.217
2019-10-31 01:28:25
168.232.129.150 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.129.150  user=root
Failed password for root from 168.232.129.150 port 36040 ssh2
Failed password for root from 168.232.129.150 port 36040 ssh2
Failed password for root from 168.232.129.150 port 36040 ssh2
Failed password for root from 168.232.129.150 port 36040 ssh2
2019-10-31 00:57:01
119.165.3.67 attack
scan z
2019-10-31 01:28:03
200.69.236.112 attackbots
2019-10-30T17:05:48.789940shield sshd\[27818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.112  user=root
2019-10-30T17:05:50.343663shield sshd\[27818\]: Failed password for root from 200.69.236.112 port 55180 ssh2
2019-10-30T17:10:52.870529shield sshd\[28697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.112  user=root
2019-10-30T17:10:54.158217shield sshd\[28697\]: Failed password for root from 200.69.236.112 port 46997 ssh2
2019-10-30T17:15:43.570968shield sshd\[29431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.112  user=root
2019-10-31 01:23:17

Recently Reported IPs

99.118.223.132 94.148.34.169 205.145.136.183 214.145.94.16
241.74.42.109 94.24.102.4 156.96.170.44 88.33.173.223
146.118.102.176 117.114.129.112 230.183.219.67 213.242.115.74
117.62.70.169 92.109.46.0 97.192.178.69 146.34.53.56
188.192.44.152 83.146.120.9 247.134.105.96 120.168.156.31