Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.3.104.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.3.104.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011602 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 11:33:02 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 252.104.3.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.104.3.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.224.232.66 attackbotsspam
Aug 14 05:35:33 [host] sshd[30230]: pam_unix(sshd:
Aug 14 05:35:34 [host] sshd[30230]: Failed passwor
Aug 14 05:37:29 [host] sshd[30250]: pam_unix(sshd:
2020-08-14 16:01:44
163.172.154.178 attack
Aug 14 06:37:25 minden010 sshd[19460]: Failed password for root from 163.172.154.178 port 36492 ssh2
Aug 14 06:40:55 minden010 sshd[20188]: Failed password for root from 163.172.154.178 port 38414 ssh2
...
2020-08-14 16:25:03
198.27.80.123 attackspambots
198.27.80.123 - - [14/Aug/2020:09:46:17 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [14/Aug/2020:09:46:25 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [14/Aug/2020:09:46:32 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [14/Aug/2020:09:46:42 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [14/Aug/2020:09:46:52 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safar
...
2020-08-14 16:07:04
79.248.204.46 attackbots
Automatic report - Port Scan Attack
2020-08-14 16:19:19
61.196.178.247 attackbots
61.196.178.247 - - [14/Aug/2020:04:37:14 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
61.196.178.247 - - [14/Aug/2020:04:37:17 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
61.196.178.247 - - [14/Aug/2020:04:37:20 +0100] "POST /wp-login.php HTTP/1.1" 200 1950 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-14 16:16:05
51.254.22.161 attackspam
detected by Fail2Ban
2020-08-14 16:12:04
27.72.102.43 attackbots
Port Scan
...
2020-08-14 16:16:51
61.133.232.251 attack
2020-08-14T02:29:02.7499891495-001 sshd[1486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.251  user=root
2020-08-14T02:29:05.1469631495-001 sshd[1486]: Failed password for root from 61.133.232.251 port 30028 ssh2
2020-08-14T02:39:15.4918631495-001 sshd[1934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.251  user=root
2020-08-14T02:39:18.0398451495-001 sshd[1934]: Failed password for root from 61.133.232.251 port 35161 ssh2
2020-08-14T03:06:19.6443951495-001 sshd[3173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.251  user=root
2020-08-14T03:06:21.8058611495-001 sshd[3173]: Failed password for root from 61.133.232.251 port 37665 ssh2
...
2020-08-14 16:39:49
5.180.76.134 attackspambots
SSH Scan
2020-08-14 16:10:01
211.176.76.124 attack
Aug 14 07:47:42 sticky sshd\[12033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.176.76.124  user=root
Aug 14 07:47:44 sticky sshd\[12033\]: Failed password for root from 211.176.76.124 port 40560 ssh2
Aug 14 07:52:20 sticky sshd\[12134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.176.76.124  user=root
Aug 14 07:52:23 sticky sshd\[12134\]: Failed password for root from 211.176.76.124 port 52148 ssh2
Aug 14 07:57:02 sticky sshd\[12191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.176.76.124  user=root
2020-08-14 15:59:47
103.141.46.154 attackspam
Aug 14 06:36:57 hosting sshd[12660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.141.46.154  user=root
Aug 14 06:36:58 hosting sshd[12660]: Failed password for root from 103.141.46.154 port 54554 ssh2
...
2020-08-14 16:31:57
80.244.179.6 attack
<6 unauthorized SSH connections
2020-08-14 16:06:13
95.111.74.98 attackspam
2020-08-14T01:24:14.239884morrigan.ad5gb.com sshd[3076666]: Failed password for root from 95.111.74.98 port 52072 ssh2
2020-08-14T01:24:14.801961morrigan.ad5gb.com sshd[3076666]: Disconnected from authenticating user root 95.111.74.98 port 52072 [preauth]
2020-08-14 16:20:42
201.159.52.226 attack
Attempted Brute Force (dovecot)
2020-08-14 16:34:22
213.6.143.122 attack
Automatic report - Port Scan Attack
2020-08-14 15:56:11

Recently Reported IPs

42.47.60.108 233.39.30.155 16.20.159.123 4.201.255.135
231.96.75.128 150.6.56.161 22.250.21.7 47.76.99.127
142.141.38.72 168.70.66.236 140.226.208.0 180.8.238.189
17.221.154.1 154.30.83.196 47.235.212.140 238.193.37.247
254.250.102.169 31.80.206.121 39.1.97.254 225.182.194.245