Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Azogues

Region: Provincia del Canar

Country: Ecuador

Internet Service Provider: unknown

Hostname: unknown

Organization: NEDETEL S.A.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
157.100.52.195 attack
robo devolver el celular por favor o se metera en problema
2020-03-03 06:42:04
157.100.52.195 attack
robo devolver el celular por favor o se metera en problema
2020-03-03 06:41:58
157.100.52.26 attackbots
3389BruteforceFW21
2019-06-26 12:25:43
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.100.52.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33690
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.100.52.194.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 09 15:57:21 +08 2019
;; MSG SIZE  rcvd: 118

Host info
194.52.100.157.in-addr.arpa domain name pointer host-157-100-52-194.ecua.net.ec.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
194.52.100.157.in-addr.arpa	name = host-157-100-52-194.ecua.net.ec.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
61.232.0.130 attackspam
Automatic report - Banned IP Access
2019-10-14 17:47:54
144.217.91.86 attackbots
2019-10-14T07:40:54.773407abusebot-7.cloudsearch.cf sshd\[23157\]: Invalid user Aa@2018 from 144.217.91.86 port 33602
2019-10-14 17:11:35
222.218.17.187 attackbots
Dovecot Brute-Force
2019-10-14 17:09:10
37.57.50.130 attack
2019-10-14T05:49:46.531997 X postfix/smtpd[42561]: NOQUEUE: reject: RCPT from unknown[37.57.50.130]: 554 5.7.1 Service unavailable; Client host [37.57.50.130] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/37.57.50.130; from= to= proto=ESMTP helo=
2019-10-14 17:18:03
190.36.186.203 attackspam
Unauthorised access (Oct 14) SRC=190.36.186.203 LEN=52 TTL=113 ID=29104 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-14 17:29:22
128.199.90.245 attackbots
Oct 14 04:18:38 firewall sshd[12122]: Invalid user 123 from 128.199.90.245
Oct 14 04:18:40 firewall sshd[12122]: Failed password for invalid user 123 from 128.199.90.245 port 45957 ssh2
Oct 14 04:24:09 firewall sshd[12216]: Invalid user DEBIAN@123 from 128.199.90.245
...
2019-10-14 17:47:23
45.55.158.8 attack
2019-10-14T08:09:32.675554abusebot-4.cloudsearch.cf sshd\[22966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.158.8  user=root
2019-10-14 17:19:33
176.107.131.128 attack
Unauthorized SSH login attempts
2019-10-14 17:40:13
60.222.254.231 attackbots
Oct 14 10:53:56 andromeda postfix/smtpd\[9474\]: warning: unknown\[60.222.254.231\]: SASL LOGIN authentication failed: authentication failure
Oct 14 10:54:01 andromeda postfix/smtpd\[14691\]: warning: unknown\[60.222.254.231\]: SASL LOGIN authentication failed: authentication failure
Oct 14 10:54:05 andromeda postfix/smtpd\[14691\]: warning: unknown\[60.222.254.231\]: SASL LOGIN authentication failed: authentication failure
Oct 14 10:54:11 andromeda postfix/smtpd\[14691\]: warning: unknown\[60.222.254.231\]: SASL LOGIN authentication failed: authentication failure
Oct 14 10:54:20 andromeda postfix/smtpd\[12684\]: warning: unknown\[60.222.254.231\]: SASL LOGIN authentication failed: authentication failure
2019-10-14 17:14:02
123.207.96.242 attack
Oct 14 08:13:43 mail sshd[17431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.96.242  user=root
Oct 14 08:13:45 mail sshd[17431]: Failed password for root from 123.207.96.242 port 26117 ssh2
Oct 14 08:35:17 mail sshd[20163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.96.242  user=root
Oct 14 08:35:19 mail sshd[20163]: Failed password for root from 123.207.96.242 port 21981 ssh2
Oct 14 08:40:02 mail sshd[20700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.96.242  user=root
Oct 14 08:40:05 mail sshd[20700]: Failed password for root from 123.207.96.242 port 57177 ssh2
...
2019-10-14 17:30:29
211.229.34.218 attack
SSH bruteforce (Triggered fail2ban)
2019-10-14 17:28:02
74.208.252.136 attackbotsspam
Oct 14 11:05:31 MK-Soft-Root1 sshd[15590]: Failed password for root from 74.208.252.136 port 43534 ssh2
...
2019-10-14 17:12:24
45.82.153.34 attackspambots
10/14/2019-10:08:16.434363 45.82.153.34 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 44
2019-10-14 17:10:46
177.130.95.87 attack
Automatic report - Port Scan Attack
2019-10-14 17:25:21
87.244.9.221 attackspambots
Automatic report - Banned IP Access
2019-10-14 17:23:35

Recently Reported IPs

61.174.253.62 101.99.75.80 89.43.156.91 68.129.72.3
37.190.61.238 118.70.187.108 43.225.99.11 95.213.177.124
191.205.62.29 101.255.92.138 202.4.107.124 14.140.192.15
125.234.119.186 188.77.210.183 178.169.134.215 87.98.147.104
81.168.105.153 222.252.25.116 139.162.98.244 72.232.3.87