Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.222.122.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.222.122.92.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 07:21:51 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 92.122.222.152.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 92.122.222.152.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.190 attack
Nov  3 19:12:16 dcd-gentoo sshd[27192]: User root from 218.92.0.190 not allowed because none of user's groups are listed in AllowGroups
Nov  3 19:12:16 dcd-gentoo sshd[27192]: User root from 218.92.0.190 not allowed because none of user's groups are listed in AllowGroups
Nov  3 19:12:19 dcd-gentoo sshd[27192]: error: PAM: Authentication failure for illegal user root from 218.92.0.190
Nov  3 19:12:16 dcd-gentoo sshd[27192]: User root from 218.92.0.190 not allowed because none of user's groups are listed in AllowGroups
Nov  3 19:12:19 dcd-gentoo sshd[27192]: error: PAM: Authentication failure for illegal user root from 218.92.0.190
Nov  3 19:12:19 dcd-gentoo sshd[27192]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.190 port 30354 ssh2
...
2019-11-04 02:27:11
50.239.143.100 attack
Nov  4 00:12:18 lcl-usvr-02 sshd[17348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.100  user=root
Nov  4 00:12:20 lcl-usvr-02 sshd[17348]: Failed password for root from 50.239.143.100 port 48694 ssh2
Nov  4 00:15:58 lcl-usvr-02 sshd[18070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.100  user=root
Nov  4 00:15:59 lcl-usvr-02 sshd[18070]: Failed password for root from 50.239.143.100 port 58948 ssh2
Nov  4 00:21:36 lcl-usvr-02 sshd[19357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.100  user=root
Nov  4 00:21:38 lcl-usvr-02 sshd[19357]: Failed password for root from 50.239.143.100 port 40980 ssh2
...
2019-11-04 02:26:20
203.147.64.98 attackspambots
$f2bV_matches
2019-11-04 02:54:18
218.92.0.202 attackspam
2019-11-03T15:03:22.077789abusebot-8.cloudsearch.cf sshd\[13252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
2019-11-04 03:03:40
209.59.104.193 attackbotsspam
Nov  3 19:05:16 vps666546 sshd\[19829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.59.104.193  user=root
Nov  3 19:05:18 vps666546 sshd\[19829\]: Failed password for root from 209.59.104.193 port 45582 ssh2
Nov  3 19:10:03 vps666546 sshd\[20091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.59.104.193  user=root
Nov  3 19:10:05 vps666546 sshd\[20091\]: Failed password for root from 209.59.104.193 port 54992 ssh2
Nov  3 19:14:47 vps666546 sshd\[20265\]: Invalid user marylee from 209.59.104.193 port 36180
Nov  3 19:14:47 vps666546 sshd\[20265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.59.104.193
...
2019-11-04 02:37:00
119.29.62.104 attack
Repeated brute force against a port
2019-11-04 03:02:27
159.65.109.148 attack
Nov  3 15:25:29 v22019058497090703 sshd[2452]: Failed password for root from 159.65.109.148 port 36836 ssh2
Nov  3 15:29:29 v22019058497090703 sshd[2729]: Failed password for root from 159.65.109.148 port 46774 ssh2
...
2019-11-04 02:22:22
184.168.152.164 attackspam
Automatic report - XMLRPC Attack
2019-11-04 02:30:44
69.244.198.97 attack
Nov  3 17:36:54 dev0-dcde-rnet sshd[2139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.244.198.97
Nov  3 17:36:56 dev0-dcde-rnet sshd[2139]: Failed password for invalid user C3ntos2018 from 69.244.198.97 port 58808 ssh2
Nov  3 17:40:51 dev0-dcde-rnet sshd[2165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.244.198.97
2019-11-04 02:28:04
209.126.127.233 attackspam
Nov  3 16:00:20 markkoudstaal sshd[14451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.126.127.233
Nov  3 16:00:22 markkoudstaal sshd[14451]: Failed password for invalid user hitman from 209.126.127.233 port 41060 ssh2
Nov  3 16:04:15 markkoudstaal sshd[14843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.126.127.233
2019-11-04 02:31:10
118.25.11.204 attackbots
Nov  3 19:12:42 [host] sshd[12000]: Invalid user Administrator from 118.25.11.204
Nov  3 19:12:42 [host] sshd[12000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.11.204
Nov  3 19:12:44 [host] sshd[12000]: Failed password for invalid user Administrator from 118.25.11.204 port 36610 ssh2
2019-11-04 02:39:12
51.89.125.114 attackbotsspam
Port scan: Attack repeated for 24 hours
2019-11-04 02:57:40
58.32.8.133 attack
Nov  3 18:17:19 cvbnet sshd[27045]: Failed password for root from 58.32.8.133 port 39036 ssh2
Nov  3 18:38:08 cvbnet sshd[27107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.32.8.133 
...
2019-11-04 02:23:50
59.42.192.217 attackspam
Brute forcing RDP port 3389
2019-11-04 02:24:10
58.20.139.26 attackbots
Nov  3 16:57:33 lnxded63 sshd[17877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.20.139.26
2019-11-04 03:01:22

Recently Reported IPs

250.235.57.42 170.146.58.218 169.5.161.161 107.151.47.189
108.100.43.135 208.236.183.23 195.14.57.153 126.204.190.211
62.198.2.232 145.72.89.151 86.8.219.198 30.5.97.6
88.155.116.179 252.47.166.172 96.218.16.14 16.209.239.58
189.104.42.33 157.185.199.252 247.209.113.129 57.19.120.133