Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.104.39.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.104.39.72.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:33:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
72.39.104.152.in-addr.arpa domain name pointer static-ip-72-39-104-152.rev.dyxnet.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.39.104.152.in-addr.arpa	name = static-ip-72-39-104-152.rev.dyxnet.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.215 attackbotsspam
Jun 18 17:27:10 santamaria sshd\[31190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Jun 18 17:27:13 santamaria sshd\[31190\]: Failed password for root from 222.186.175.215 port 5204 ssh2
Jun 18 17:27:16 santamaria sshd\[31190\]: Failed password for root from 222.186.175.215 port 5204 ssh2
...
2020-06-18 23:42:19
36.71.232.25 attackspambots
1592481961 - 06/18/2020 14:06:01 Host: 36.71.232.25/36.71.232.25 Port: 445 TCP Blocked
2020-06-18 23:54:16
200.108.132.90 attackspam
Jun 18 13:27:01 mail.srvfarm.net postfix/smtps/smtpd[1465073]: warning: unknown[200.108.132.90]: SASL PLAIN authentication failed: 
Jun 18 13:27:01 mail.srvfarm.net postfix/smtps/smtpd[1465073]: lost connection after AUTH from unknown[200.108.132.90]
Jun 18 13:29:50 mail.srvfarm.net postfix/smtps/smtpd[1467860]: warning: unknown[200.108.132.90]: SASL PLAIN authentication failed: 
Jun 18 13:29:50 mail.srvfarm.net postfix/smtps/smtpd[1467860]: lost connection after AUTH from unknown[200.108.132.90]
Jun 18 13:34:46 mail.srvfarm.net postfix/smtpd[1469322]: warning: unknown[200.108.132.90]: SASL PLAIN authentication failed:
2020-06-19 00:16:48
222.186.30.59 attackspambots
Jun 18 20:52:33 gw1 sshd[15401]: Failed password for root from 222.186.30.59 port 48062 ssh2
...
2020-06-18 23:57:28
189.208.241.110 attackbots
Automatic report - Port Scan Attack
2020-06-19 00:00:00
217.112.142.155 attackbotsspam
Jun 18 13:50:03 mail.srvfarm.net postfix/smtpd[1468820]: NOQUEUE: reject: RCPT from event.yobaat.com[217.112.142.155]: 554 5.7.1 Service unavailable; Client host [217.112.142.155] blocked using zen.spamhaus.org; from= to= proto=ESMTP helo=
Jun 18 13:50:24 mail.srvfarm.net postfix/smtpd[1469352]: NOQUEUE: reject: RCPT from unknown[217.112.142.155]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun 18 13:50:36 mail.srvfarm.net postfix/smtpd[1469352]: NOQUEUE: reject: RCPT from event.yobaat.com[217.112.142.155]: 554 5.7.1 Service unavailable; Client host [217.112.142.155] blocked using zen.spamhaus.org; from= to= proto=ESMTP helo=
Jun 18 13:56:08 mail.srvfarm.net postfix/smtpd[1474096]: NOQUEUE: rejec
2020-06-19 00:10:59
178.94.14.90 attackbotsspam
Telnetd brute force attack detected by fail2ban
2020-06-18 23:33:01
35.189.172.158 attackspambots
Jun 18 17:17:08 Ubuntu-1404-trusty-64-minimal sshd\[31195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.189.172.158  user=root
Jun 18 17:17:09 Ubuntu-1404-trusty-64-minimal sshd\[31195\]: Failed password for root from 35.189.172.158 port 44890 ssh2
Jun 18 17:19:23 Ubuntu-1404-trusty-64-minimal sshd\[5888\]: Invalid user sales from 35.189.172.158
Jun 18 17:19:23 Ubuntu-1404-trusty-64-minimal sshd\[5888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.189.172.158
Jun 18 17:19:25 Ubuntu-1404-trusty-64-minimal sshd\[5888\]: Failed password for invalid user sales from 35.189.172.158 port 51970 ssh2
2020-06-18 23:56:57
167.172.118.7 attack
REQUESTED PAGE: /index.phpfavicon.ico
2020-06-18 23:38:40
183.129.49.86 attackbotsspam
Jun 18 13:59:56 web01.agentur-b-2.de postfix/smtpd[1168156]: warning: unknown[183.129.49.86]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 13:59:56 web01.agentur-b-2.de postfix/smtpd[1168156]: lost connection after AUTH from unknown[183.129.49.86]
Jun 18 14:00:04 web01.agentur-b-2.de postfix/smtpd[1168156]: warning: unknown[183.129.49.86]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 14:00:04 web01.agentur-b-2.de postfix/smtpd[1168156]: lost connection after AUTH from unknown[183.129.49.86]
Jun 18 14:00:16 web01.agentur-b-2.de postfix/smtpd[1176981]: warning: unknown[183.129.49.86]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 14:00:16 web01.agentur-b-2.de postfix/smtpd[1176981]: lost connection after AUTH from unknown[183.129.49.86]
2020-06-19 00:12:56
1.2.153.65 attackspambots
1592481946 - 06/18/2020 14:05:46 Host: 1.2.153.65/1.2.153.65 Port: 445 TCP Blocked
2020-06-19 00:10:28
93.99.134.28 attackbotsspam
Jun 18 13:50:56 mail.srvfarm.net postfix/smtps/smtpd[1469501]: warning: unknown[93.99.134.28]: SASL PLAIN authentication failed: 
Jun 18 13:50:56 mail.srvfarm.net postfix/smtps/smtpd[1469501]: lost connection after AUTH from unknown[93.99.134.28]
Jun 18 13:52:52 mail.srvfarm.net postfix/smtps/smtpd[1472204]: warning: unknown[93.99.134.28]: SASL PLAIN authentication failed: 
Jun 18 13:52:52 mail.srvfarm.net postfix/smtps/smtpd[1472204]: lost connection after AUTH from unknown[93.99.134.28]
Jun 18 13:59:23 mail.srvfarm.net postfix/smtpd[1474820]: warning: unknown[93.99.134.28]: SASL PLAIN authentication failed:
2020-06-19 00:13:54
158.69.58.43 attackspambots
Port scan on 1 port(s): 53
2020-06-18 23:51:25
193.122.172.254 attackspambots
Jun 18 15:21:48 rush sshd[25910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.172.254
Jun 18 15:21:50 rush sshd[25910]: Failed password for invalid user csgosrv from 193.122.172.254 port 51304 ssh2
Jun 18 15:23:11 rush sshd[25930]: Failed password for root from 193.122.172.254 port 39660 ssh2
...
2020-06-18 23:35:59
5.188.87.51 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-18T15:06:06Z and 2020-06-18T15:14:02Z
2020-06-18 23:41:34

Recently Reported IPs

21.101.173.172 193.55.21.22 72.190.129.107 12.44.249.83
216.255.156.251 248.237.251.243 29.211.219.234 224.153.248.81
174.250.143.213 178.131.230.15 194.45.12.22 238.29.172.143
39.3.211.95 153.207.126.250 202.197.26.69 9.145.211.177
140.251.169.94 8.229.71.90 80.170.98.108 67.107.69.229