Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.2.136.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.2.136.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 02:50:27 CST 2025
;; MSG SIZE  rcvd: 104
Host info
241.136.2.5.in-addr.arpa domain name pointer static-5-2-136-241.rdsnet.ro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.136.2.5.in-addr.arpa	name = static-5-2-136-241.rdsnet.ro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.56.17.5 attackspambots
Failed password for root from 200.56.17.5 port 43670 ssh2
2020-08-04 19:25:05
52.80.107.207 attack
[ssh] SSH attack
2020-08-04 19:51:01
183.82.121.34 attackspambots
SSHD unauthorised connection attempt (b)
2020-08-04 19:37:06
167.99.183.237 attackbots
Aug  4 07:21:53 NPSTNNYC01T sshd[19758]: Failed password for root from 167.99.183.237 port 38232 ssh2
Aug  4 07:26:00 NPSTNNYC01T sshd[20130]: Failed password for root from 167.99.183.237 port 50656 ssh2
...
2020-08-04 19:49:50
106.13.165.247 attackspam
Aug  4 12:27:05 nextcloud sshd\[17237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.165.247  user=root
Aug  4 12:27:07 nextcloud sshd\[17237\]: Failed password for root from 106.13.165.247 port 48428 ssh2
Aug  4 12:33:51 nextcloud sshd\[25852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.165.247  user=root
2020-08-04 19:11:06
115.29.39.194 attack
ft-1848-fussball.de 115.29.39.194 [04/Aug/2020:11:26:22 +0200] "POST /wp-login.php HTTP/1.1" 200 6279 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
ft-1848-fussball.de 115.29.39.194 [04/Aug/2020:11:26:26 +0200] "POST /wp-login.php HTTP/1.1" 200 6244 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-04 19:33:05
176.107.183.146 attack
1,11-03/31 [bc01/m29] PostRequest-Spammer scoring: maputo01_x2b
2020-08-04 19:19:52
51.15.229.198 attack
Aug  4 13:35:31 buvik sshd[31002]: Failed password for root from 51.15.229.198 port 51840 ssh2
Aug  4 13:39:28 buvik sshd[31552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.229.198  user=root
Aug  4 13:39:29 buvik sshd[31552]: Failed password for root from 51.15.229.198 port 33242 ssh2
...
2020-08-04 19:44:39
45.55.156.19 attackbots
Aug  4 01:18:33 web9 sshd\[16058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.156.19  user=root
Aug  4 01:18:35 web9 sshd\[16058\]: Failed password for root from 45.55.156.19 port 52836 ssh2
Aug  4 01:22:33 web9 sshd\[16672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.156.19  user=root
Aug  4 01:22:35 web9 sshd\[16672\]: Failed password for root from 45.55.156.19 port 34758 ssh2
Aug  4 01:26:38 web9 sshd\[17267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.156.19  user=root
2020-08-04 19:51:42
116.248.19.6 attackspam
Port probing on unauthorized port 5555
2020-08-04 19:13:13
106.12.55.170 attack
Aug  4 16:59:54 webhost01 sshd[31562]: Failed password for root from 106.12.55.170 port 47118 ssh2
...
2020-08-04 19:13:28
58.56.140.62 attackspam
Aug  4 13:37:12 vpn01 sshd[19562]: Failed password for root from 58.56.140.62 port 4417 ssh2
...
2020-08-04 19:50:42
106.52.89.152 attackspambots
Aug  4 11:26:13 b-vps wordpress(rreb.cz)[2022]: Authentication attempt for unknown user barbora from 106.52.89.152
...
2020-08-04 19:43:29
101.37.21.63 attackbotsspam
Unauthorized connection attempt detected from IP address 101.37.21.63 to port 80
2020-08-04 19:40:51
222.186.30.218 attackbots
Aug  4 13:19:52 piServer sshd[3027]: Failed password for root from 222.186.30.218 port 44085 ssh2
Aug  4 13:19:57 piServer sshd[3027]: Failed password for root from 222.186.30.218 port 44085 ssh2
Aug  4 13:20:00 piServer sshd[3027]: Failed password for root from 222.186.30.218 port 44085 ssh2
...
2020-08-04 19:21:20

Recently Reported IPs

157.13.160.68 99.33.76.88 20.137.26.26 217.138.221.115
129.241.18.174 224.112.198.200 12.122.232.254 65.222.103.38
77.240.98.113 137.56.205.59 22.155.4.166 196.112.121.14
9.251.38.92 153.105.228.130 95.160.45.14 110.130.7.105
65.30.192.189 200.223.201.58 84.125.85.143 184.89.156.32