Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.195.22.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5301
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.195.22.146.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 13:38:24 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 146.22.195.152.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 152.195.22.146.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
202.51.74.189 attack
Failed password for root from 202.51.74.189 port 56022 ssh2
2020-04-29 23:30:47
51.91.8.222 attackspam
invalid login attempt (gmodserver2)
2020-04-29 23:22:33
209.65.68.190 attackspam
Invalid user admins from 209.65.68.190 port 37698
2020-04-29 23:30:21
111.73.45.41 attackspam
Unauthorized connection attempt from IP address 111.73.45.41 on Port 445(SMB)
2020-04-29 23:08:00
159.203.82.104 attack
Apr 29 15:10:10  sshd\[32019\]: User root from 159.203.82.104 not allowed because not listed in AllowUsersApr 29 15:10:12  sshd\[32019\]: Failed password for invalid user root from 159.203.82.104 port 40921 ssh2
...
2020-04-29 23:17:26
177.139.136.73 attack
Failed password for root from 177.139.136.73 port 48314 ssh2
2020-04-29 23:35:42
155.230.28.207 attackbotsspam
Apr 29 18:09:23 pkdns2 sshd\[28006\]: Invalid user romulo from 155.230.28.207Apr 29 18:09:25 pkdns2 sshd\[28006\]: Failed password for invalid user romulo from 155.230.28.207 port 42748 ssh2Apr 29 18:12:14 pkdns2 sshd\[28138\]: Failed password for root from 155.230.28.207 port 53774 ssh2Apr 29 18:14:59 pkdns2 sshd\[28207\]: Invalid user ubuntu from 155.230.28.207Apr 29 18:15:01 pkdns2 sshd\[28207\]: Failed password for invalid user ubuntu from 155.230.28.207 port 36574 ssh2Apr 29 18:17:51 pkdns2 sshd\[28353\]: Invalid user tomcat from 155.230.28.207Apr 29 18:17:53 pkdns2 sshd\[28353\]: Failed password for invalid user tomcat from 155.230.28.207 port 47606 ssh2
...
2020-04-29 23:37:02
191.239.247.75 attack
Invalid user kathrine from 191.239.247.75 port 38892
2020-04-29 23:31:35
175.118.126.18 attackspam
Fail2Ban Ban Triggered
2020-04-29 23:01:41
68.183.56.212 attack
$f2bV_matches
2020-04-29 23:21:14
180.164.164.109 attackspambots
Failed password for root from 180.164.164.109 port 15721 ssh2
2020-04-29 23:33:35
121.229.0.154 attackbots
Apr 29 15:00:51 hell sshd[15947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.0.154
Apr 29 15:00:53 hell sshd[15947]: Failed password for invalid user jjl from 121.229.0.154 port 38754 ssh2
...
2020-04-29 23:43:14
180.76.111.214 attackbotsspam
Failed password for root from 180.76.111.214 port 43292 ssh2
2020-04-29 23:34:13
117.50.70.120 attackbotsspam
Invalid user host from 117.50.70.120 port 43512
2020-04-29 23:19:46
171.252.124.224 attack
port scan and connect, tcp 80 (http)
2020-04-29 23:10:53

Recently Reported IPs

219.182.42.239 177.217.201.40 222.30.220.85 206.218.120.69
154.165.230.81 150.25.102.201 155.76.50.191 244.191.197.105
18.182.91.26 71.14.226.143 75.59.94.129 66.64.5.221
130.180.95.110 19.219.75.221 30.178.221.116 253.133.165.215
60.201.241.138 29.50.58.69 46.9.175.121 253.0.216.159