Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
72.52.128.92 attackbotsspam
Jul 11 13:56:58 prod4 sshd\[27568\]: Failed password for root from 72.52.128.92 port 43400 ssh2
Jul 11 13:59:40 prod4 sshd\[28804\]: Failed password for root from 72.52.128.92 port 50326 ssh2
Jul 11 14:02:24 prod4 sshd\[30743\]: Failed password for root from 72.52.128.92 port 57060 ssh2
...
2020-07-11 20:40:02
72.52.128.92 attack
Jun 30 16:51:59 ks10 sshd[1479001]: Failed password for root from 72.52.128.92 port 52446 ssh2
...
2020-07-01 00:14:41
72.52.128.192 attackbots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-16 06:47:59
72.52.128.192 attack
SSH bruteforce
2019-12-07 15:43:14
72.52.128.192 attackbots
$f2bV_matches
2019-12-06 06:10:29
72.52.128.192 attackbotsspam
Bruteforce on SSH Honeypot
2019-11-30 21:28:49
72.52.128.192 attack
Nov 27 15:55:14 localhost sshd\[12812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.52.128.192  user=daemon
Nov 27 15:55:16 localhost sshd\[12812\]: Failed password for daemon from 72.52.128.192 port 57848 ssh2
Nov 27 15:55:18 localhost sshd\[12816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.52.128.192  user=bin
Nov 27 15:55:20 localhost sshd\[12816\]: Failed password for bin from 72.52.128.192 port 58150 ssh2
Nov 27 15:55:21 localhost sshd\[12818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.52.128.192  user=bin
...
2019-11-27 22:59:55
72.52.128.192 attack
Nov 23 06:24:53 *** sshd[9429]: Did not receive identification string from 72.52.128.192
2019-11-23 18:19:29
72.52.128.192 attackspam
Port 22 Scan, PTR: PTR record not found
2019-11-22 01:34:13
72.52.128.192 attack
Nov 17 06:16:10 wbs sshd\[1927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.52.128.192  user=daemon
Nov 17 06:16:12 wbs sshd\[1927\]: Failed password for daemon from 72.52.128.192 port 55502 ssh2
Nov 17 06:16:19 wbs sshd\[1937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.52.128.192  user=bin
Nov 17 06:16:21 wbs sshd\[1937\]: Failed password for bin from 72.52.128.192 port 57346 ssh2
Nov 17 06:16:26 wbs sshd\[1942\]: Invalid user pso from 72.52.128.192
2019-11-18 01:24:34
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.52.12.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6587
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;72.52.12.139.			IN	A

;; AUTHORITY SECTION:
.			100	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 05:14:24 CST 2022
;; MSG SIZE  rcvd: 105
Host info
139.12.52.72.in-addr.arpa domain name pointer a72-52-12-139.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.12.52.72.in-addr.arpa	name = a72-52-12-139.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.51.216.203 attack
Unauthorized connection attempt detected from IP address 122.51.216.203 to port 11145
2020-07-22 16:39:47
113.74.137.243 attackspam
Unauthorized connection attempt detected from IP address 113.74.137.243 to port 5555
2020-07-22 16:43:01
121.234.251.204 attackspambots
Unauthorized connection attempt detected from IP address 121.234.251.204 to port 1433
2020-07-22 16:40:16
171.110.238.114 attackbotsspam
Unauthorized connection attempt detected from IP address 171.110.238.114 to port 23
2020-07-22 16:37:49
186.206.157.34 attack
Invalid user y from 186.206.157.34 port 32369
2020-07-22 16:33:08
14.226.91.90 attackspambots
Unauthorized connection attempt detected from IP address 14.226.91.90 to port 445
2020-07-22 16:08:34
139.59.147.218 attackspambots
www.rbtierfotografie.de 139.59.147.218 [22/Jul/2020:08:24:27 +0200] "POST /wp-login.php HTTP/1.1" 200 6187 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
www.rbtierfotografie.de 139.59.147.218 [22/Jul/2020:08:24:27 +0200] "POST /wp-login.php HTTP/1.1" 200 6140 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-22 16:15:56
93.147.39.194 attackbotsspam
Unauthorized connection attempt detected from IP address 93.147.39.194 to port 23
2020-07-22 16:20:08
84.237.231.191 attackspam
Unauthorized connection attempt detected from IP address 84.237.231.191 to port 80
2020-07-22 16:22:13
180.183.118.99 attack
Unauthorized connection attempt detected from IP address 180.183.118.99 to port 23
2020-07-22 16:13:43
117.40.153.73 attackbotsspam
Unauthorized connection attempt detected from IP address 117.40.153.73 to port 445
2020-07-22 16:41:42
13.92.187.106 attackspambots
Icarus honeypot on github
2020-07-22 16:27:42
120.52.152.3 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-07-22 16:41:25
13.85.72.71 attackbots
Unauthorized connection attempt detected from IP address 13.85.72.71 to port 1433
2020-07-22 16:09:05
104.211.5.175 attack
Unauthorized connection attempt detected from IP address 104.211.5.175 to port 1433
2020-07-22 16:44:16

Recently Reported IPs

206.208.76.3 139.185.180.226 185.136.218.116 139.63.164.94
155.147.61.234 58.211.69.234 79.61.147.12 58.202.179.113
153.185.4.243 21.86.47.14 99.170.7.136 37.242.92.78
221.42.111.189 64.22.94.105 96.53.236.90 27.131.6.35
82.76.156.112 224.127.193.219 213.251.184.36 128.130.61.133