Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       104.252.0.0 - 104.253.255.255
CIDR:           104.252.0.0/15
NetName:        EGN-21
NetHandle:      NET-104-252-0-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   EGIHosting (EGNL-1)
RegDate:        2014-12-05
Updated:        2023-03-24
Comment:        Geofeed https://geofeed.egihosting.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/104.252.0.0


OrgName:        EGIHosting
OrgId:          EGNL-1
Address:        3223 Kenneth Street
City:           Santa Clara
StateProv:      CA
PostalCode:     95054
Country:        US
RegDate:        2007-07-23
Updated:        2025-04-01
Comment:        http://egihosting.com
Comment:        Geofeed https://geofeed.egihosting.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/EGNL-1


OrgTechHandle: CHENJ-ARIN
OrgTechName:   Chen, James 
OrgTechPhone:  +1-408-228-4448 
OrgTechEmail:  james@egihosting.com
OrgTechRef:    https://rdap.arin.net/registry/entity/CHENJ-ARIN

OrgTechHandle: HERNA1269-ARIN
OrgTechName:   Hernandez, Aaron 
OrgTechPhone:  +1-408-228-4448 
OrgTechEmail:  aaron@egihosting.com
OrgTechRef:    https://rdap.arin.net/registry/entity/HERNA1269-ARIN

OrgNOCHandle: NOC2660-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-888-808-8806 
OrgNOCEmail:  noc@egihosting.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC2660-ARIN

OrgTechHandle: TRANH54-ARIN
OrgTechName:   Tran, Hung 
OrgTechPhone:  +1-408-581-1984 
OrgTechEmail:  htran@egihosting.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TRANH54-ARIN

OrgRoutingHandle: NOC2660-ARIN
OrgRoutingName:   Network Operations Center
OrgRoutingPhone:  +1-888-808-8806 
OrgRoutingEmail:  noc@egihosting.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NOC2660-ARIN

OrgTechHandle: SIMKI10-ARIN
OrgTechName:   Simkiss, John 
OrgTechPhone:  +1-408-228-4448 
OrgTechEmail:  jas3@egihosting.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SIMKI10-ARIN

OrgTechHandle: TRANR22-ARIN
OrgTechName:   Tran, Ryan 
OrgTechPhone:  +1-408-228-4448 
OrgTechEmail:  rtran@egihosting.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TRANR22-ARIN

OrgAbuseHandle: ABUSE1715-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-888-808-8806 
OrgAbuseEmail:  abuse@egihosting.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1715-ARIN

OrgTechHandle: KUMAR396-ARIN
OrgTechName:   kumar, Indhira 
OrgTechPhone:  +1-408-228-4448 
OrgTechEmail:  indra.kumar@egihosting.com
OrgTechRef:    https://rdap.arin.net/registry/entity/KUMAR396-ARIN

OrgTechHandle: KTBIJ-ARIN
OrgTechName:   KT, Bijoy 
OrgTechPhone:  +1-888-808-8806 
OrgTechEmail:  egni@egihosting.com
OrgTechRef:    https://rdap.arin.net/registry/entity/KTBIJ-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.252.191.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35181
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.252.191.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025112901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 29 21:34:40 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 82.191.252.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.191.252.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.128.113.99 attackspambots
Apr 17 00:19:01 mail postfix/smtpd\[11895\]: warning: unknown\[78.128.113.99\]: SASL PLAIN authentication failed: \
Apr 17 01:02:23 mail postfix/smtpd\[12625\]: warning: unknown\[78.128.113.99\]: SASL PLAIN authentication failed: \
Apr 17 01:02:50 mail postfix/smtpd\[12551\]: warning: unknown\[78.128.113.99\]: SASL PLAIN authentication failed: \
Apr 17 01:09:19 mail postfix/smtpd\[12625\]: warning: unknown\[78.128.113.99\]: SASL PLAIN authentication failed: \
2020-04-17 07:30:53
163.179.126.39 attackbots
Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-17 07:29:34
165.227.211.179 attackspam
Port 26148 scan denied
2020-04-17 07:18:50
47.12.246.241 attackbots
SERVER-WEBAPP DD-WRT httpd cgi-bin remote command execution attempt - port: 80 proto: TCP cat: Attempted Administrator Privilege Gain
2020-04-17 07:13:40
66.232.63.37 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 55 - port: 8089 proto: TCP cat: Misc Attack
2020-04-17 07:10:23
89.248.172.101 attackspambots
04/16/2020-18:09:38.600710 89.248.172.101 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-17 07:03:30
185.50.149.4 attack
2020-04-17 01:24:35 dovecot_login authenticator failed for \(\[185.50.149.4\]\) \[185.50.149.4\]: 535 Incorrect authentication data \(set_id=webmaster@orogest.it\)
2020-04-17 01:24:44 dovecot_login authenticator failed for \(\[185.50.149.4\]\) \[185.50.149.4\]: 535 Incorrect authentication data
2020-04-17 01:24:56 dovecot_login authenticator failed for \(\[185.50.149.4\]\) \[185.50.149.4\]: 535 Incorrect authentication data
2020-04-17 01:25:01 dovecot_login authenticator failed for \(\[185.50.149.4\]\) \[185.50.149.4\]: 535 Incorrect authentication data
2020-04-17 01:25:14 dovecot_login authenticator failed for \(\[185.50.149.4\]\) \[185.50.149.4\]: 535 Incorrect authentication data
2020-04-17 07:30:07
65.19.174.198 attackbotsspam
Port 15000 scan denied
2020-04-17 07:11:06
113.190.37.142 attack
SSH-bruteforce attempts
2020-04-17 07:40:30
65.49.20.120 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 54 - port: 443 proto: UDP cat: Misc Attack
2020-04-17 07:10:45
180.76.119.34 attack
2020-04-16T21:03:32.564459shield sshd\[23710\]: Invalid user wz from 180.76.119.34 port 52490
2020-04-16T21:03:32.568025shield sshd\[23710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.34
2020-04-16T21:03:34.021642shield sshd\[23710\]: Failed password for invalid user wz from 180.76.119.34 port 52490 ssh2
2020-04-16T21:12:20.989487shield sshd\[25384\]: Invalid user ry from 180.76.119.34 port 59596
2020-04-16T21:12:20.993293shield sshd\[25384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.34
2020-04-17 07:30:37
180.164.126.13 attackbotsspam
20 attempts against mh-ssh on echoip
2020-04-17 07:27:36
27.68.32.70 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 12 - port: 9530 proto: TCP cat: Misc Attack
2020-04-17 07:17:01
180.76.171.53 attackbotsspam
Apr 17 01:14:14 ns382633 sshd\[2938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.171.53  user=root
Apr 17 01:14:16 ns382633 sshd\[2938\]: Failed password for root from 180.76.171.53 port 51572 ssh2
Apr 17 01:17:56 ns382633 sshd\[3852\]: Invalid user tk from 180.76.171.53 port 57124
Apr 17 01:17:56 ns382633 sshd\[3852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.171.53
Apr 17 01:17:59 ns382633 sshd\[3852\]: Failed password for invalid user tk from 180.76.171.53 port 57124 ssh2
2020-04-17 07:21:17
211.159.154.136 attackbotsspam
Apr 16 23:11:51 localhost sshd\[16996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.154.136  user=root
Apr 16 23:11:52 localhost sshd\[16996\]: Failed password for root from 211.159.154.136 port 44526 ssh2
Apr 16 23:14:50 localhost sshd\[17130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.154.136  user=root
Apr 16 23:14:53 localhost sshd\[17130\]: Failed password for root from 211.159.154.136 port 39000 ssh2
Apr 16 23:18:26 localhost sshd\[17405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.154.136  user=root
...
2020-04-17 07:22:08

Recently Reported IPs

34.91.125.183 103.196.9.223 104.164.173.83 102.89.76.176
18.118.185.105 45.156.87.211 36.50.54.6 13.86.115.189
154.203.160.167 107.189.6.63 47.237.176.162 47.237.164.0
47.84.130.214 47.237.182.210 103.4.250.233 104.164.126.69
194.187.177.222 212.50.16.174 212.50.16.26 51.158.253.21