Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.238.137.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.238.137.149.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081802 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 19 08:14:56 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 149.137.238.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.137.238.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
34.67.85.179 attackbots
Sep 13 14:02:20 ny01 sshd[22959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.67.85.179
Sep 13 14:02:23 ny01 sshd[22959]: Failed password for invalid user ftpuser from 34.67.85.179 port 46496 ssh2
Sep 13 14:06:05 ny01 sshd[23554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.67.85.179
2019-09-14 02:06:38
169.197.108.6 attackbots
Tried to access remote/login
2019-09-14 02:08:27
106.13.39.233 attackspambots
Sep 13 16:46:38 microserver sshd[62918]: Invalid user oracle from 106.13.39.233 port 41064
Sep 13 16:46:38 microserver sshd[62918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.39.233
Sep 13 16:46:40 microserver sshd[62918]: Failed password for invalid user oracle from 106.13.39.233 port 41064 ssh2
Sep 13 16:51:55 microserver sshd[63606]: Invalid user postgres from 106.13.39.233 port 49948
Sep 13 16:51:55 microserver sshd[63606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.39.233
Sep 13 17:07:47 microserver sshd[481]: Invalid user smbuser from 106.13.39.233 port 43954
Sep 13 17:07:47 microserver sshd[481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.39.233
Sep 13 17:07:50 microserver sshd[481]: Failed password for invalid user smbuser from 106.13.39.233 port 43954 ssh2
Sep 13 17:13:05 microserver sshd[1232]: Invalid user gmodserver from 106.13.39.233 port 5266
2019-09-14 01:19:12
95.46.181.21 attackbotsspam
Sep 13 12:55:57 mxgate1 postfix/postscreen[16125]: CONNECT from [95.46.181.21]:58046 to [176.31.12.44]:25
Sep 13 12:55:57 mxgate1 postfix/dnsblog[16129]: addr 95.46.181.21 listed by domain cbl.abuseat.org as 127.0.0.2
Sep 13 12:55:57 mxgate1 postfix/dnsblog[16128]: addr 95.46.181.21 listed by domain bl.spamcop.net as 127.0.0.2
Sep 13 12:55:58 mxgate1 postfix/postscreen[16125]: PREGREET 20 after 0.69 from [95.46.181.21]:58046: HELO agdysmsgu.com

Sep 13 12:55:58 mxgate1 postfix/dnsblog[16130]: addr 95.46.181.21 listed by domain zen.spamhaus.org as 127.0.0.4
Sep 13 12:55:58 mxgate1 postfix/dnsblog[16130]: addr 95.46.181.21 listed by domain zen.spamhaus.org as 127.0.0.3
Sep 13 12:55:58 mxgate1 postfix/postscreen[16125]: DNSBL rank 4 for [95.46.181.21]:58046
Sep x@x
Sep 13 12:56:00 mxgate1 postfix/postscreen[16125]: HANGUP after 2.1 from [95.46.181.21]:58046 in tests after SMTP handshake
Sep 13 12:56:00 mxgate1 postfix/postscreen[16125]: DISCONNECT [95.46.181.21]:58046


........
---------------------------------
2019-09-14 01:49:16
203.210.244.163 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-13 11:01:43,369 INFO [amun_request_handler] PortScan Detected on Port: 445 (203.210.244.163)
2019-09-14 01:26:14
112.86.98.172 attackbotsspam
Sep 13 19:04:50 mars sshd\[6498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.86.98.172  user=root
Sep 13 19:04:50 mars sshd\[6499\]: Invalid user admin from 112.86.98.172
Sep 13 19:04:50 mars sshd\[6499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.86.98.172
...
2019-09-14 02:01:01
188.131.170.119 attack
Sep 13 07:29:41 php1 sshd\[31635\]: Invalid user vncuser from 188.131.170.119
Sep 13 07:29:41 php1 sshd\[31635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.170.119
Sep 13 07:29:43 php1 sshd\[31635\]: Failed password for invalid user vncuser from 188.131.170.119 port 58138 ssh2
Sep 13 07:35:35 php1 sshd\[32149\]: Invalid user password1 from 188.131.170.119
Sep 13 07:35:35 php1 sshd\[32149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.170.119
2019-09-14 01:52:57
104.248.161.244 attackbotsspam
Sep 13 13:44:04 rpi sshd[5745]: Failed password for root from 104.248.161.244 port 39866 ssh2
2019-09-14 02:02:21
81.30.208.114 attackbotsspam
Sep 13 06:51:28 hiderm sshd\[23199\]: Invalid user vsftpd from 81.30.208.114
Sep 13 06:51:28 hiderm sshd\[23199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.208.114.static.ufanet.ru
Sep 13 06:51:30 hiderm sshd\[23199\]: Failed password for invalid user vsftpd from 81.30.208.114 port 58077 ssh2
Sep 13 06:58:34 hiderm sshd\[23860\]: Invalid user 123 from 81.30.208.114
Sep 13 06:58:34 hiderm sshd\[23860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.208.114.static.ufanet.ru
2019-09-14 01:09:35
178.62.118.53 attackspambots
Sep 13 19:24:03 vps01 sshd[15996]: Failed password for ubuntu from 178.62.118.53 port 34152 ssh2
2019-09-14 01:48:08
94.132.37.12 attack
Unauthorized SSH login attempts
2019-09-14 01:53:59
72.11.168.29 attackspam
Automatic report - Banned IP Access
2019-09-14 01:10:29
36.71.34.110 attackbots
Unauthorized connection attempt from IP address 36.71.34.110 on Port 445(SMB)
2019-09-14 01:21:22
85.144.226.170 attack
Sep 13 06:58:37 auw2 sshd\[25960\]: Invalid user jenkins from 85.144.226.170
Sep 13 06:58:37 auw2 sshd\[25960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170-226-144-85.ftth.glasoperator.nl
Sep 13 06:58:39 auw2 sshd\[25960\]: Failed password for invalid user jenkins from 85.144.226.170 port 43716 ssh2
Sep 13 07:03:28 auw2 sshd\[26386\]: Invalid user nagios from 85.144.226.170
Sep 13 07:03:28 auw2 sshd\[26386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170-226-144-85.ftth.glasoperator.nl
2019-09-14 01:08:27
106.51.143.178 attack
Sep 13 02:40:13 eddieflores sshd\[27410\]: Invalid user tester from 106.51.143.178
Sep 13 02:40:13 eddieflores sshd\[27410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.178
Sep 13 02:40:15 eddieflores sshd\[27410\]: Failed password for invalid user tester from 106.51.143.178 port 50538 ssh2
Sep 13 02:44:39 eddieflores sshd\[27813\]: Invalid user sysadmin from 106.51.143.178
Sep 13 02:44:39 eddieflores sshd\[27813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.178
2019-09-14 02:01:57

Recently Reported IPs

125.182.198.153 76.79.69.231 213.154.45.95 5.64.16.133
106.77.200.123 182.100.48.210 183.89.229.157 189.191.49.74
88.171.86.61 4.17.236.107 107.217.5.47 179.220.56.99
166.156.211.95 63.191.152.74 86.34.18.215 88.202.238.27
137.219.209.132 27.214.218.163 82.10.247.59 88.202.238.20