Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tirana

Region: Tirane

Country: Albania

Internet Service Provider: ONE

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
46.252.45.29 attack
This IP address is of a little 12 year old boy, he needs to be controlled by a guardian or parent. The things he says online to people is not very appropriate for others, he probably does this to get attention from older people. Please if anyone could come and teach him a lesson, it would be honestly necessary. This type of behavior gets you to a bad place and its a bad influence for other younger kids. This shows that the internet is a bad place for little kids like him. If you have anything else to ask or say, my email is pleasekillyourself85@gmail.com
2023-08-04 00:59:13
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.252.45.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.252.45.28.			IN	A

;; AUTHORITY SECTION:
.			400	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112101 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 22 01:53:58 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 28.45.252.46.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.45.252.46.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.181.166.128 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-17 20:11:01
181.120.246.83 attackspambots
Invalid user ur from 181.120.246.83 port 49634
2020-04-17 20:14:19
54.36.54.24 attack
Port Scan: Events[2] countPorts[1]: 22 ..
2020-04-17 20:13:05
95.216.139.24 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-04-17 19:53:20
113.23.0.101 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-17 19:55:58
212.47.245.158 attackspambots
212.47.245.158 - - [17/Apr/2020:13:11:51 +0200] "GET /wp-login.php HTTP/1.1" 200 1899 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.47.245.158 - - [17/Apr/2020:13:11:57 +0200] "POST /wp-login.php HTTP/1.1" 200 2029 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.47.245.158 - - [17/Apr/2020:13:11:57 +0200] "GET /wp-login.php HTTP/1.1" 200 1899 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.47.245.158 - - [17/Apr/2020:13:12:02 +0200] "POST /wp-login.php HTTP/1.1" 200 2005 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.47.245.158 - - [17/Apr/2020:13:12:02 +0200] "GET /wp-login.php HTTP/1.1" 200 1899 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.47.245.158 - - [17/Apr/2020:13:12:02 +0200] "POST /wp-login.php HTTP/1.1" 200 2006 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001
...
2020-04-17 19:45:20
149.202.162.73 attackbots
Apr 17 01:47:02 web9 sshd\[9547\]: Invalid user ci from 149.202.162.73
Apr 17 01:47:02 web9 sshd\[9547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.162.73
Apr 17 01:47:04 web9 sshd\[9547\]: Failed password for invalid user ci from 149.202.162.73 port 57252 ssh2
Apr 17 01:53:09 web9 sshd\[10392\]: Invalid user postgres from 149.202.162.73
Apr 17 01:53:09 web9 sshd\[10392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.162.73
2020-04-17 19:57:21
79.124.62.86 attackbots
04/17/2020-07:49:44.584474 79.124.62.86 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-17 19:53:42
71.10.112.17 attackspambots
WEB_SERVER 403 Forbidden
2020-04-17 19:47:24
79.124.62.82 attackspam
3305/tcp 3401/tcp 8250/tcp...
[2020-03-17/04-17]1231pkt,474pt.(tcp)
2020-04-17 19:56:22
194.149.33.10 attackbots
Invalid user je from 194.149.33.10 port 55224
2020-04-17 20:06:37
89.248.160.150 attackspambots
89.248.160.150 was recorded 21 times by 12 hosts attempting to connect to the following ports: 41127,41134,41115. Incident counter (4h, 24h, all-time): 21, 112, 11495
2020-04-17 20:12:23
122.176.38.177 attackspambots
Invalid user draytek from 122.176.38.177 port 53958
2020-04-17 20:08:19
94.254.125.44 attackspambots
2020-04-17 12:57:29,519 fail2ban.actions: WARNING [ssh] Ban 94.254.125.44
2020-04-17 19:39:33
125.166.75.212 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-17 19:38:21

Recently Reported IPs

46.252.45.2 46.252.45.30 20.16.198.8 141.95.32.24
141.95.32.165 230.98.63.42 15.154.194.242 31.116.101.205
146.190.102.250 162.243.136.79 109.71.7.225 186.182.88.244
31.187.78.137 88.171.159.130 8.142.86.133 8.142.86.157
1.11.199.72 92.117.244.180 217.110.95.229 223.72.117.212