Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.52.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29733
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.52.161.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:38:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 161.52.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.52.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.4.73.51 attack
Unauthorized connection attempt from IP address 117.4.73.51 on Port 445(SMB)
2019-09-28 23:28:08
177.93.69.179 attackbots
DATE:2019-09-28 14:32:15, IP:177.93.69.179, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-09-28 23:44:34
176.31.128.45 attackspambots
Sep 28 10:51:38 ny01 sshd[10883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.128.45
Sep 28 10:51:40 ny01 sshd[10883]: Failed password for invalid user ur from 176.31.128.45 port 57104 ssh2
Sep 28 10:55:42 ny01 sshd[11879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.128.45
2019-09-28 23:19:56
173.236.195.185 attackspam
Automatic report - Banned IP Access
2019-09-28 23:55:34
49.88.112.78 attackspam
$f2bV_matches
2019-09-28 23:50:13
190.94.18.131 attack
Unauthorized connection attempt from IP address 190.94.18.131 on Port 445(SMB)
2019-09-28 23:06:30
104.131.36.183 attackbotsspam
WordPress wp-login brute force :: 104.131.36.183 0.300 BYPASS [28/Sep/2019:22:32:43  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-28 23:16:26
94.176.5.253 attack
(Sep 28)  LEN=44 TTL=244 ID=36767 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=7284 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=14874 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=40619 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=45016 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=52164 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=48500 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=32875 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=48208 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=24279 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=38374 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=39946 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=18643 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=1950 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 28)  LEN=44 TTL=244 ID=60322 DF TCP DPT=23 WINDOW=14600 SY...
2019-09-28 23:46:53
43.227.66.153 attack
Sep 28 11:27:02 ny01 sshd[18214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.66.153
Sep 28 11:27:05 ny01 sshd[18214]: Failed password for invalid user xt from 43.227.66.153 port 56222 ssh2
Sep 28 11:34:34 ny01 sshd[19680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.66.153
2019-09-28 23:42:49
122.161.101.190 attackspambots
$f2bV_matches
2019-09-28 23:08:28
149.202.223.136 attackspam
\[2019-09-28 10:58:31\] NOTICE\[1948\] chan_sip.c: Registration from '\' failed for '149.202.223.136:61314' - Wrong password
\[2019-09-28 10:58:31\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-28T10:58:31.302-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="21000017",SessionID="0x7f1e1c0e6f88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/149.202.223.136/61314",Challenge="78380452",ReceivedChallenge="78380452",ReceivedHash="d3f1b943118c1b4ecba75cafc4e7aefb"
\[2019-09-28 10:58:33\] NOTICE\[1948\] chan_sip.c: Registration from '\' failed for '149.202.223.136:60012' - Wrong password
\[2019-09-28 10:58:33\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-28T10:58:33.083-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="45633",SessionID="0x7f1e1c02d9c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/149.202.223.1
2019-09-28 23:06:54
78.85.126.143 attack
Unauthorized connection attempt from IP address 78.85.126.143 on Port 445(SMB)
2019-09-28 23:35:28
123.24.235.146 attackbotsspam
Unauthorized connection attempt from IP address 123.24.235.146 on Port 445(SMB)
2019-09-28 23:52:32
104.40.4.51 attackspambots
F2B jail: sshd. Time: 2019-09-28 17:01:18, Reported by: VKReport
2019-09-28 23:18:05
128.0.130.116 attack
Sep 28 05:23:09 sachi sshd\[13970\]: Invalid user vmaloba from 128.0.130.116
Sep 28 05:23:10 sachi sshd\[13970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.0.130.116
Sep 28 05:23:12 sachi sshd\[13970\]: Failed password for invalid user vmaloba from 128.0.130.116 port 36218 ssh2
Sep 28 05:27:38 sachi sshd\[14374\]: Invalid user hazen from 128.0.130.116
Sep 28 05:27:38 sachi sshd\[14374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.0.130.116
2019-09-28 23:34:13

Recently Reported IPs

104.22.52.158 104.22.52.166 104.22.52.171 104.22.52.176
104.22.52.156 104.22.52.179 104.22.52.180 104.22.52.181
104.22.52.189 104.22.52.194 104.22.52.208 104.22.52.217
104.22.52.204 104.22.52.201 104.22.52.202 104.22.52.213
104.22.52.196 101.213.145.153 104.22.52.228 104.22.52.218