Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Allen

Region: Texas

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.189.158.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.189.158.157.		IN	A

;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030300 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 04 05:02:21 CST 2020
;; MSG SIZE  rcvd: 119
Host info
157.158.189.104.in-addr.arpa domain name pointer 104-189-158-157.lightspeed.rcsntx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.158.189.104.in-addr.arpa	name = 104-189-158-157.lightspeed.rcsntx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.254.0.113 attackbotsspam
2019-10-07T09:57:12.274015abusebot-5.cloudsearch.cf sshd\[20678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.113  user=root
2019-10-07 18:11:57
152.136.141.227 attack
Oct  7 06:40:56 www sshd\[45549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.141.227  user=root
Oct  7 06:40:58 www sshd\[45549\]: Failed password for root from 152.136.141.227 port 52424 ssh2
Oct  7 06:45:43 www sshd\[45628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.141.227  user=root
...
2019-10-07 17:42:20
141.98.80.81 attack
Brute Force attack - banned by Fail2Ban
2019-10-07 17:46:32
117.67.216.238 attack
Fail2Ban - FTP Abuse Attempt
2019-10-07 18:03:14
180.76.186.233 attackbots
Oct  6 19:14:30 h2034429 sshd[6500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.186.233  user=r.r
Oct  6 19:14:32 h2034429 sshd[6500]: Failed password for r.r from 180.76.186.233 port 38456 ssh2
Oct  6 19:14:32 h2034429 sshd[6500]: Received disconnect from 180.76.186.233 port 38456:11: Bye Bye [preauth]
Oct  6 19:14:32 h2034429 sshd[6500]: Disconnected from 180.76.186.233 port 38456 [preauth]
Oct  6 19:23:29 h2034429 sshd[6675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.186.233  user=r.r
Oct  6 19:23:31 h2034429 sshd[6675]: Failed password for r.r from 180.76.186.233 port 41696 ssh2
Oct  6 19:23:31 h2034429 sshd[6675]: Received disconnect from 180.76.186.233 port 41696:11: Bye Bye [preauth]
Oct  6 19:23:31 h2034429 sshd[6675]: Disconnected from 180.76.186.233 port 41696 [preauth]
Oct  6 19:28:07 h2034429 sshd[6719]: pam_unix(sshd:auth): authentication failure; lognam........
-------------------------------
2019-10-07 17:44:15
89.233.219.57 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-10-07 17:32:32
91.121.70.118 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/91.121.70.118/ 
 FR - 1H : (137)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN16276 
 
 IP : 91.121.70.118 
 
 CIDR : 91.121.0.0/16 
 
 PREFIX COUNT : 132 
 
 UNIQUE IP COUNT : 3052544 
 
 
 WYKRYTE ATAKI Z ASN16276 :  
  1H - 9 
  3H - 12 
  6H - 17 
 12H - 29 
 24H - 68 
 
 DateTime : 2019-10-07 05:44:48 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-07 18:14:48
192.99.17.189 attackspambots
Oct  7 11:56:31 dedicated sshd[3353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.17.189  user=root
Oct  7 11:56:32 dedicated sshd[3353]: Failed password for root from 192.99.17.189 port 45734 ssh2
2019-10-07 18:06:18
190.191.194.9 attack
Oct 06 22:19:37 askasleikir sshd[225701]: Failed password for root from 190.191.194.9 port 54723 ssh2
Oct 06 22:39:27 askasleikir sshd[226236]: Failed password for root from 190.191.194.9 port 48447 ssh2
Oct 06 22:29:50 askasleikir sshd[225976]: Failed password for root from 190.191.194.9 port 37746 ssh2
2019-10-07 18:06:47
129.226.67.166 attack
PHP DIESCAN Information Disclosure Vulnerability
2019-10-07 17:46:58
112.94.2.65 attack
Oct  7 06:27:10 vps01 sshd[10254]: Failed password for root from 112.94.2.65 port 13313 ssh2
2019-10-07 17:42:52
121.27.57.251 attackspambots
Unauthorised access (Oct  7) SRC=121.27.57.251 LEN=40 TTL=49 ID=24854 TCP DPT=8080 WINDOW=12092 SYN 
Unauthorised access (Oct  7) SRC=121.27.57.251 LEN=40 TTL=49 ID=30922 TCP DPT=8080 WINDOW=15944 SYN 
Unauthorised access (Oct  7) SRC=121.27.57.251 LEN=40 TTL=49 ID=22031 TCP DPT=8080 WINDOW=57836 SYN 
Unauthorised access (Oct  6) SRC=121.27.57.251 LEN=40 TTL=49 ID=24503 TCP DPT=8080 WINDOW=12092 SYN 
Unauthorised access (Oct  6) SRC=121.27.57.251 LEN=40 TTL=49 ID=63019 TCP DPT=8080 WINDOW=12092 SYN
2019-10-07 18:04:34
157.230.113.218 attackspam
Oct  7 07:00:26 www sshd\[11375\]: Invalid user PHP@2017 from 157.230.113.218Oct  7 07:00:27 www sshd\[11375\]: Failed password for invalid user PHP@2017 from 157.230.113.218 port 50826 ssh2Oct  7 07:04:18 www sshd\[11573\]: Invalid user Michigan2017 from 157.230.113.218
...
2019-10-07 18:01:07
222.186.52.107 attack
Oct  7 11:40:59 nextcloud sshd\[18748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.107  user=root
Oct  7 11:41:01 nextcloud sshd\[18748\]: Failed password for root from 222.186.52.107 port 59094 ssh2
Oct  7 11:41:28 nextcloud sshd\[19670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.107  user=root
...
2019-10-07 17:51:47
111.252.199.52 attackbots
Telnet Server BruteForce Attack
2019-10-07 17:37:22

Recently Reported IPs

173.56.175.81 171.2.46.22 87.95.43.33 115.76.34.45
4.59.117.81 110.249.144.42 1.191.240.19 45.143.223.128
37.49.226.101 58.179.24.115 191.172.253.223 158.221.137.86
84.247.19.75 73.232.107.78 111.1.154.240 211.216.17.14
165.112.93.242 177.76.244.103 105.145.50.77 120.157.48.10