Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
58.254.220.116 attack
email spam
2020-01-15 16:20:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.254.2.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.254.2.52.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 14:49:36 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 52.2.254.58.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.2.254.58.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
156.218.20.65 attackspam
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=64401)(10151156)
2019-10-16 03:09:32
101.87.167.252 attackbots
[portscan] udp/500 [isakmp]
[scan/connect: 55 time(s)]
in spfbl.net:'listed'
*(RWIN=-)(10151156)
2019-10-16 03:13:53
51.15.86.1 attack
[portscan] tcp/22 [SSH]
[scan/connect: 2 time(s)]
in blocklist.de:'listed [ssh]'
*(RWIN=65535)(10151156)
2019-10-16 03:41:01
216.244.73.226 attack
[IPBX probe: SIP=tcp/5060]
[scan/connect: 2 time(s)]
*(RWIN=512)(10151156)
2019-10-16 03:05:01
89.179.135.34 attackbots
[portscan] tcp/1433 [MsSQL]
[scan/connect: 8 time(s)]
in stopforumspam:'listed [4 times]'
in spfbl.net:'listed'
*(RWIN=8192)(10151156)
2019-10-16 03:28:19
185.232.67.8 attackbots
Oct 15 21:19:05 dedicated sshd[16002]: Invalid user admin from 185.232.67.8 port 38590
2019-10-16 03:32:09
112.80.25.74 attackbotsspam
[portscan] tcp/1433 [MsSQL]
in spfbl.net:'listed'
*(RWIN=1024)(10151156)
2019-10-16 03:26:23
185.172.110.214 attackbots
UTC: 2019-10-14 pkts: 4 port: 81/tcp
2019-10-16 03:08:24
112.114.40.49 attackspambots
Port Scan: TCP/21
2019-10-16 03:35:17
37.49.230.10 attackspam
firewall-block, port(s): 123/udp
2019-10-16 03:29:01
45.79.106.170 attackbotsspam
UTC: 2019-10-14 port: 22/tcp
2019-10-16 03:18:16
183.82.32.140 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-16 03:08:39
119.122.213.247 attack
[portscan] tcp/1433 [MsSQL]
in spfbl.net:'listed'
*(RWIN=1024)(10151156)
2019-10-16 03:11:59
122.150.67.115 attackspam
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=36175)(10151156)
2019-10-16 03:11:20
37.49.227.202 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-10-16 03:29:32

Recently Reported IPs

43.63.191.229 170.143.111.66 196.129.229.65 146.162.236.129
243.156.141.180 12.207.226.124 116.168.243.49 103.194.171.193
117.115.128.163 152.95.77.83 176.139.110.97 65.206.148.251
34.25.111.128 153.141.223.243 148.147.135.254 30.250.109.3
254.212.199.198 193.75.109.190 77.235.22.86 218.248.43.214