Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dublin

Region: Leinster

Country: Ireland

Internet Service Provider: unknown

Hostname: unknown

Organization: Microsoft Corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.138.210.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18651
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.138.210.201.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041301 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 14 05:42:12 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 201.210.138.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 201.210.138.52.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
78.100.18.81 attackspam
Nov 23 21:27:18 tux-35-217 sshd\[19561\]: Invalid user edu328 from 78.100.18.81 port 53738
Nov 23 21:27:18 tux-35-217 sshd\[19561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.100.18.81
Nov 23 21:27:20 tux-35-217 sshd\[19561\]: Failed password for invalid user edu328 from 78.100.18.81 port 53738 ssh2
Nov 23 21:34:00 tux-35-217 sshd\[19615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.100.18.81  user=root
...
2019-11-24 05:04:33
103.75.161.158 attackbotsspam
Connection by 103.75.161.158 on port: 26 got caught by honeypot at 11/23/2019 1:19:05 PM
2019-11-24 05:15:57
120.192.217.102 attack
" "
2019-11-24 04:58:33
152.32.98.231 attack
23/tcp
[2019-11-23]1pkt
2019-11-24 05:21:26
222.98.37.25 attackbotsspam
Nov 23 20:44:46 MK-Soft-VM8 sshd[26165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.37.25 
Nov 23 20:44:47 MK-Soft-VM8 sshd[26165]: Failed password for invalid user rpm from 222.98.37.25 port 52293 ssh2
...
2019-11-24 05:06:16
80.185.214.123 attack
Nov 23 17:38:59 Ubuntu-1404-trusty-64-minimal sshd\[13503\]: Invalid user admin from 80.185.214.123
Nov 23 17:38:59 Ubuntu-1404-trusty-64-minimal sshd\[13503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.185.214.123
Nov 23 17:39:00 Ubuntu-1404-trusty-64-minimal sshd\[13503\]: Failed password for invalid user admin from 80.185.214.123 port 59626 ssh2
Nov 23 21:17:21 Ubuntu-1404-trusty-64-minimal sshd\[16536\]: Invalid user ftp_user from 80.185.214.123
Nov 23 21:17:21 Ubuntu-1404-trusty-64-minimal sshd\[16536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.185.214.123
2019-11-24 04:48:03
113.239.244.94 attackbotsspam
badbot
2019-11-24 05:04:09
45.55.93.245 attackspambots
Automatic report - Banned IP Access
2019-11-24 05:22:20
202.137.155.94 attackspambots
Nov 23 15:06:30 mail postfix/smtps/smtpd[533]: warning: unknown[202.137.155.94]: SASL PLAIN authentication failed: 
Nov 23 15:10:50 mail postfix/smtpd[6190]: warning: unknown[202.137.155.94]: SASL PLAIN authentication failed: 
Nov 23 15:15:41 mail postfix/smtpd[5771]: warning: unknown[202.137.155.94]: SASL PLAIN authentication failed:
2019-11-24 05:06:50
178.128.72.117 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-11-24 04:46:10
191.6.84.3 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-24 04:52:10
51.79.141.17 attack
Nov 23 20:51:13 vmd26974 sshd[24942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.141.17
Nov 23 20:51:15 vmd26974 sshd[24942]: Failed password for invalid user operator from 51.79.141.17 port 54422 ssh2
...
2019-11-24 04:53:25
88.148.44.212 attackspambots
Automatic report - Port Scan Attack
2019-11-24 04:49:51
51.79.70.223 attack
Nov 23 21:31:59 MK-Soft-Root2 sshd[20723]: Failed password for root from 51.79.70.223 port 39854 ssh2
...
2019-11-24 05:05:58
142.93.211.66 attack
142.93.211.66 - - \[23/Nov/2019:21:38:16 +0100\] "POST /wp-login.php HTTP/1.0" 200 6655 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.211.66 - - \[23/Nov/2019:21:38:20 +0100\] "POST /wp-login.php HTTP/1.0" 200 6493 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.211.66 - - \[23/Nov/2019:21:38:28 +0100\] "POST /wp-login.php HTTP/1.0" 200 6492 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-24 05:07:36

Recently Reported IPs

31.46.16.95 197.52.77.53 183.157.170.13 197.56.231.240
120.86.70.92 77.201.57.77 120.88.46.226 189.110.155.213
51.68.198.150 88.230.23.61 124.66.144.114 35.239.61.237
185.200.118.67 119.29.219.186 129.204.78.16 190.239.180.169
46.97.44.18 165.22.129.155 174.138.86.85 104.223.26.200