Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.138.0.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.138.0.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 13:40:13 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 8.0.138.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.0.138.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.155 attack
Feb  4 13:53:16 dcd-gentoo sshd[19601]: User root from 222.186.42.155 not allowed because none of user's groups are listed in AllowGroups
Feb  4 13:53:21 dcd-gentoo sshd[19601]: error: PAM: Authentication failure for illegal user root from 222.186.42.155
Feb  4 13:53:16 dcd-gentoo sshd[19601]: User root from 222.186.42.155 not allowed because none of user's groups are listed in AllowGroups
Feb  4 13:53:21 dcd-gentoo sshd[19601]: error: PAM: Authentication failure for illegal user root from 222.186.42.155
Feb  4 13:53:16 dcd-gentoo sshd[19601]: User root from 222.186.42.155 not allowed because none of user's groups are listed in AllowGroups
Feb  4 13:53:21 dcd-gentoo sshd[19601]: error: PAM: Authentication failure for illegal user root from 222.186.42.155
Feb  4 13:53:21 dcd-gentoo sshd[19601]: Failed keyboard-interactive/pam for invalid user root from 222.186.42.155 port 58651 ssh2
...
2020-02-04 20:53:50
92.118.37.55 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 5390 proto: TCP cat: Misc Attack
2020-02-04 20:32:14
178.47.139.172 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-04 21:19:20
46.38.144.202 attackbots
Feb  4 13:48:14 relay postfix/smtpd\[27587\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 13:48:33 relay postfix/smtpd\[5440\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 13:48:56 relay postfix/smtpd\[4433\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 13:49:18 relay postfix/smtpd\[4792\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 13:49:37 relay postfix/smtpd\[30654\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-04 20:49:56
139.162.99.243 attackbots
Unauthorized connection attempt detected from IP address 139.162.99.243 to port 102 [J]
2020-02-04 20:38:45
110.36.218.182 attackspam
Unauthorized connection attempt detected from IP address 110.36.218.182 to port 80 [J]
2020-02-04 21:11:09
218.92.0.171 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Failed password for root from 218.92.0.171 port 8993 ssh2
Failed password for root from 218.92.0.171 port 8993 ssh2
Failed password for root from 218.92.0.171 port 8993 ssh2
Failed password for root from 218.92.0.171 port 8993 ssh2
2020-02-04 20:38:21
185.112.82.237 attack
contact form spammer
2020-02-04 20:37:48
125.161.128.161 attackspambots
1580791972 - 02/04/2020 05:52:52 Host: 125.161.128.161/125.161.128.161 Port: 445 TCP Blocked
2020-02-04 21:20:42
113.23.44.167 attack
1580792000 - 02/04/2020 05:53:20 Host: 113.23.44.167/113.23.44.167 Port: 445 TCP Blocked
2020-02-04 20:56:04
217.27.121.13 attack
Automatic report - Port Scan Attack
2020-02-04 21:17:35
218.158.231.140 attack
3389BruteforceFW23
2020-02-04 20:47:25
145.239.82.192 attackspam
Unauthorized connection attempt detected from IP address 145.239.82.192 to port 2220 [J]
2020-02-04 21:24:24
176.107.130.190 attackbotsspam
2020-2-4 10:28:34 AM: failed ssh attempt
2020-02-04 20:34:55
222.186.173.238 attackspam
Feb  4 13:40:26 minden010 sshd[23328]: Failed password for root from 222.186.173.238 port 65254 ssh2
Feb  4 13:40:40 minden010 sshd[23328]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 65254 ssh2 [preauth]
Feb  4 13:40:47 minden010 sshd[23372]: Failed password for root from 222.186.173.238 port 33036 ssh2
...
2020-02-04 20:44:14

Recently Reported IPs

125.52.126.220 5.41.37.30 8.159.221.46 153.214.69.232
12.166.86.115 229.38.59.75 231.7.27.117 147.93.181.241
50.253.164.66 229.189.94.72 131.54.76.0 85.41.187.16
149.104.228.142 204.55.214.21 235.48.179.150 92.191.238.178
83.206.145.244 64.167.111.141 5.108.23.221 186.78.199.125