Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.40.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19631
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.40.152.			IN	A

;; AUTHORITY SECTION:
.			457	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:42:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 152.40.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.40.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.32.80.7 attackbotsspam
Aug 25 09:22:12 hb sshd\[16640\]: Invalid user alisa from 187.32.80.7
Aug 25 09:22:12 hb sshd\[16640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.80.7
Aug 25 09:22:15 hb sshd\[16640\]: Failed password for invalid user alisa from 187.32.80.7 port 56742 ssh2
Aug 25 09:27:12 hb sshd\[17044\]: Invalid user kot from 187.32.80.7
Aug 25 09:27:12 hb sshd\[17044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.80.7
2019-08-25 17:37:34
87.237.209.18 attackbots
WordPress XMLRPC scan :: 87.237.209.18 0.056 BYPASS [25/Aug/2019:18:03:27  1000] [censored_4] "POST /xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-25 18:06:48
200.49.39.210 attackspambots
Aug 25 00:25:02 kapalua sshd\[4767\]: Invalid user operatore from 200.49.39.210
Aug 25 00:25:02 kapalua sshd\[4767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.49.39.210
Aug 25 00:25:05 kapalua sshd\[4767\]: Failed password for invalid user operatore from 200.49.39.210 port 49172 ssh2
Aug 25 00:30:11 kapalua sshd\[5227\]: Invalid user itsd from 200.49.39.210
Aug 25 00:30:11 kapalua sshd\[5227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.49.39.210
2019-08-25 18:33:49
185.176.27.106 attackbots
08/25/2019-05:54:18.314654 185.176.27.106 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-25 18:35:17
157.230.97.200 attackbots
Aug 25 00:11:49 lcprod sshd\[27044\]: Invalid user gituser from 157.230.97.200
Aug 25 00:11:49 lcprod sshd\[27044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.97.200
Aug 25 00:11:51 lcprod sshd\[27044\]: Failed password for invalid user gituser from 157.230.97.200 port 60022 ssh2
Aug 25 00:15:57 lcprod sshd\[27396\]: Invalid user operator from 157.230.97.200
Aug 25 00:15:57 lcprod sshd\[27396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.97.200
2019-08-25 18:26:33
104.236.230.165 attackspam
Aug 25 12:07:03 eventyay sshd[30976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.230.165
Aug 25 12:07:06 eventyay sshd[30976]: Failed password for invalid user inma from 104.236.230.165 port 47427 ssh2
Aug 25 12:11:09 eventyay sshd[31047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.230.165
...
2019-08-25 18:16:17
42.7.17.177 attackbotsspam
Unauthorised access (Aug 25) SRC=42.7.17.177 LEN=40 TTL=49 ID=27578 TCP DPT=8080 WINDOW=10742 SYN
2019-08-25 17:28:38
88.225.216.16 attackbots
Unauthorized connection attempt from IP address 88.225.216.16 on Port 445(SMB)
2019-08-25 17:48:44
204.93.157.111 attack
Aug 25 12:08:07 docs sshd\[32277\]: Invalid user magic from 204.93.157.111Aug 25 12:08:09 docs sshd\[32277\]: Failed password for invalid user magic from 204.93.157.111 port 40634 ssh2Aug 25 12:12:19 docs sshd\[32345\]: Invalid user customs from 204.93.157.111Aug 25 12:12:20 docs sshd\[32345\]: Failed password for invalid user customs from 204.93.157.111 port 52814 ssh2Aug 25 12:16:25 docs sshd\[32408\]: Invalid user db2inst from 204.93.157.111Aug 25 12:16:27 docs sshd\[32408\]: Failed password for invalid user db2inst from 204.93.157.111 port 36248 ssh2
...
2019-08-25 17:29:10
62.76.84.115 attackspam
Unauthorized connection attempt from IP address 62.76.84.115 on Port 445(SMB)
2019-08-25 18:13:29
188.165.220.213 attackbotsspam
Aug 24 23:35:38 php1 sshd\[29354\]: Invalid user george from 188.165.220.213
Aug 24 23:35:38 php1 sshd\[29354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.220.213
Aug 24 23:35:40 php1 sshd\[29354\]: Failed password for invalid user george from 188.165.220.213 port 51422 ssh2
Aug 24 23:39:28 php1 sshd\[29819\]: Invalid user nas from 188.165.220.213
Aug 24 23:39:28 php1 sshd\[29819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.220.213
2019-08-25 17:52:48
141.101.227.90 attackbots
[portscan] Port scan
2019-08-25 18:18:13
111.125.208.90 attackbotsspam
Unauthorized connection attempt from IP address 111.125.208.90 on Port 445(SMB)
2019-08-25 17:52:00
2002:755a:659::755a:659 attackspambots
2019-08-25 03:03:00 dovecot_login authenticator failed for (ndcneybf.com) [2002:755a:659::755a:659]:63398 I=[2001:470:1f0f:3ad:bb:dcff:fe50:d900]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2019-08-25 03:03:28 dovecot_login authenticator failed for (ndcneybf.com) [2002:755a:659::755a:659]:64829 I=[2001:470:1f0f:3ad:bb:dcff:fe50:d900]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2019-08-25 03:03:54 dovecot_login authenticator failed for (ndcneybf.com) [2002:755a:659::755a:659]:49719 I=[2001:470:1f0f:3ad:bb:dcff:fe50:d900]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
...
2019-08-25 17:19:02
137.74.47.22 attackspambots
Aug 25 11:36:40 legacy sshd[31528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.47.22
Aug 25 11:36:42 legacy sshd[31528]: Failed password for invalid user mgeweb from 137.74.47.22 port 54746 ssh2
Aug 25 11:40:31 legacy sshd[31665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.47.22
...
2019-08-25 17:55:11

Recently Reported IPs

104.22.40.177 104.196.229.100 104.22.40.190 104.22.40.124
104.22.40.189 104.22.40.175 104.22.40.180 104.22.40.65
104.22.40.227 104.22.41.101 104.22.40.90 104.22.41.104
104.22.40.202 104.22.41.116 104.22.41.124 104.22.41.175
104.22.41.177 104.22.41.152 104.22.41.105 104.22.40.217