Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.152.138.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.152.138.165.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 04:36:57 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 165.138.152.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 165.138.152.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
69.94.143.10 attack
TCP src-port=42619   dst-port=25    zen-spamhaus spam-sorbs unsubscore         (320)
2019-06-21 23:19:17
206.189.200.22 attackspambots
fraudulent SSH attempt
2019-06-22 00:14:16
207.102.204.93 attack
firewall-block, port(s): 23/tcp
2019-06-22 00:03:12
196.54.65.175 attack
Spammer
2019-06-21 23:07:14
14.186.234.22 attackspambots
81/tcp
[2019-06-21]1pkt
2019-06-21 23:16:21
103.94.130.4 attack
Invalid user cube from 103.94.130.4 port 41059
2019-06-21 23:45:29
91.132.6.235 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-21 11:09:06]
2019-06-22 00:11:42
139.59.59.187 attackbotsspam
Invalid user ftpuser from 139.59.59.187 port 59064
2019-06-21 23:36:32
122.116.212.188 attackbots
23/tcp
[2019-06-21]1pkt
2019-06-21 23:25:50
109.165.74.183 attackbots
445/tcp 445/tcp 445/tcp
[2019-06-21]3pkt
2019-06-21 23:26:29
41.223.42.11 attack
Unauthorised access (Jun 21) SRC=41.223.42.11 LEN=40 TTL=242 ID=12497 TCP DPT=445 WINDOW=1024 SYN
2019-06-21 23:17:48
51.77.222.160 attackbots
Jun 21 10:29:32 bilbo sshd\[924\]: Invalid user teamspeak from 51.77.222.160\
Jun 21 10:29:34 bilbo sshd\[924\]: Failed password for invalid user teamspeak from 51.77.222.160 port 51220 ssh2\
Jun 21 10:30:13 bilbo sshd\[1950\]: Failed password for root from 51.77.222.160 port 54678 ssh2\
Jun 21 10:30:49 bilbo sshd\[3131\]: Invalid user analytics from 51.77.222.160\
2019-06-21 23:21:09
125.212.217.214 attackspambots
¯\_(ツ)_/¯
2019-06-22 00:21:32
151.50.116.242 attackbotsspam
23/tcp
[2019-06-21]1pkt
2019-06-22 00:20:49
108.162.210.250 attackbots
8080/tcp
[2019-06-21]1pkt
2019-06-21 23:58:30

Recently Reported IPs

83.47.119.72 231.78.13.109 242.209.48.71 35.134.169.167
5.37.246.135 237.71.114.239 230.207.143.105 46.151.11.50
14.18.127.170 86.14.145.98 202.47.225.24 52.30.94.185
87.134.109.187 5.108.239.244 63.187.118.51 52.99.88.21
165.238.200.224 15.243.72.224 146.141.196.149 174.223.177.41