Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.248.239.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.248.239.65.			IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019093002 1800 900 604800 86400

;; Query time: 319 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 01 08:35:43 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 65.239.248.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 65.239.248.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
13.70.1.39 attack
Invalid user samba1 from 13.70.1.39 port 35870
2020-04-30 14:16:15
117.84.114.21 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 117.84.114.21 (21.114.84.117.broad.wx.js.dynamic.163data.com.cn): 5 in the last 3600 secs - Thu Jun 21 02:39:02 2018
2020-04-30 14:04:17
5.70.202.178 attack
Port scan on 1 port(s): 8080
2020-04-30 13:54:32
223.149.246.61 attack
Honeypot hit.
2020-04-30 14:06:01
183.159.88.138 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 183.159.88.138 (-): 5 in the last 3600 secs - Thu Jun 21 03:38:52 2018
2020-04-30 13:58:15
182.219.172.224 attack
$f2bV_matches
2020-04-30 13:51:08
179.185.78.91 attackbotsspam
Apr 29 19:25:22 sachi sshd\[4393\]: Invalid user jahnavi from 179.185.78.91
Apr 29 19:25:22 sachi sshd\[4393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.78.91.static.gvt.net.br
Apr 29 19:25:24 sachi sshd\[4393\]: Failed password for invalid user jahnavi from 179.185.78.91 port 38486 ssh2
Apr 29 19:32:48 sachi sshd\[5106\]: Invalid user weblogic from 179.185.78.91
Apr 29 19:32:48 sachi sshd\[5106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.78.91.static.gvt.net.br
2020-04-30 14:07:01
112.116.0.59 attack
Brute force blocker - service: proftpd1 - aantal: 155 - Thu Jun 21 04:40:16 2018
2020-04-30 13:55:37
14.192.212.152 attack
C1,WP GET /wp-login.php
2020-04-30 13:50:04
128.199.170.33 attackspambots
Apr 30 07:43:06 meumeu sshd[5281]: Failed password for root from 128.199.170.33 port 39054 ssh2
Apr 30 07:48:21 meumeu sshd[5899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.33 
Apr 30 07:48:23 meumeu sshd[5899]: Failed password for invalid user steam from 128.199.170.33 port 48462 ssh2
...
2020-04-30 14:03:24
124.160.83.138 attack
Apr 30 06:07:42 sshgateway sshd\[24151\]: Invalid user user01 from 124.160.83.138
Apr 30 06:07:42 sshgateway sshd\[24151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.83.138
Apr 30 06:07:44 sshgateway sshd\[24151\]: Failed password for invalid user user01 from 124.160.83.138 port 51015 ssh2
2020-04-30 14:14:22
222.191.177.58 attack
lfd: (smtpauth) Failed SMTP AUTH login from 222.191.177.58 (-): 5 in the last 3600 secs - Thu Jun 21 03:09:22 2018
2020-04-30 13:57:04
58.37.214.154 attackbotsspam
$f2bV_matches
2020-04-30 13:38:10
114.225.83.125 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 114.225.83.125 (-): 5 in the last 3600 secs - Thu Jun 21 02:30:35 2018
2020-04-30 14:07:40
176.119.140.226 spam
Steam scamer PC he wants to giveawey free skins for cs go but its a scam
2020-04-30 13:50:04

Recently Reported IPs

113.65.215.91 190.75.130.137 5.186.25.246 164.120.86.217
73.188.245.137 180.47.16.245 124.179.64.32 59.208.63.108
58.156.79.162 99.6.179.71 64.37.239.232 41.35.88.120
54.97.219.86 195.119.180.140 187.178.52.130 3.167.127.189
192.110.212.203 49.156.254.11 151.141.90.213 190.147.215.200