Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.104.27.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.104.27.152.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:45:15 CST 2025
;; MSG SIZE  rcvd: 107
Host info
152.27.104.164.in-addr.arpa domain name pointer host164-104-27-152.dhcp.psdschools.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
152.27.104.164.in-addr.arpa	name = host164-104-27-152.dhcp.psdschools.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.15.46.184 attackbotsspam
Nov 29 12:28:49 webhost01 sshd[15680]: Failed password for mysql from 51.15.46.184 port 33648 ssh2
...
2019-11-29 13:44:57
106.52.54.18 attack
2019-11-29T05:31:13.996694abusebot-6.cloudsearch.cf sshd\[11898\]: Invalid user backup from 106.52.54.18 port 53102
2019-11-29 13:47:27
129.211.4.202 attack
Nov 29 06:30:05 ns381471 sshd[21965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.4.202
Nov 29 06:30:07 ns381471 sshd[21965]: Failed password for invalid user hugue from 129.211.4.202 port 52182 ssh2
2019-11-29 13:48:20
104.227.60.54 attackspam
(From impressivedesignz4u@gmail.com) Hello,

I have run some diagnostic tools on your website and saw immediately that there is plenty of room for improvement. With a few upgrades on your existing platform, your website can start generating more sales, leads, and more business. Your website is your most important digital asset out on the Web, and it's time that it got the upgrade that it sorely needs. 

Search engines like Google have a way of accessing websites to look for certain keywords and elements that will highlight what your site is all about. I specialize in making sure that search algorithms find what they need on your website to put it on top of the search results.

I'll be glad to give you more detailed information about how you can make your website more profitable and what the results will be during a free consultation. Kindly reply to let me know when's the best time to give in touch with you if you're interested. I look forward to hearing back from you.

Kurt Caldwell
2019-11-29 13:38:25
144.217.166.92 attackspambots
Nov 29 04:58:22 venus sshd\[11700\]: Invalid user jocelynn from 144.217.166.92 port 45622
Nov 29 04:58:22 venus sshd\[11700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.166.92
Nov 29 04:58:24 venus sshd\[11700\]: Failed password for invalid user jocelynn from 144.217.166.92 port 45622 ssh2
...
2019-11-29 13:27:41
190.246.33.145 attackbotsspam
Automatic report - Banned IP Access
2019-11-29 13:17:40
89.248.174.3 attackspambots
Connection by 89.248.174.3 on port: 26 got caught by honeypot at 11/29/2019 4:01:00 AM
2019-11-29 13:26:36
119.29.65.240 attackspambots
Nov 29 10:41:19 vibhu-HP-Z238-Microtower-Workstation sshd\[382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.65.240  user=root
Nov 29 10:41:21 vibhu-HP-Z238-Microtower-Workstation sshd\[382\]: Failed password for root from 119.29.65.240 port 50402 ssh2
Nov 29 10:45:36 vibhu-HP-Z238-Microtower-Workstation sshd\[636\]: Invalid user jord from 119.29.65.240
Nov 29 10:45:36 vibhu-HP-Z238-Microtower-Workstation sshd\[636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.65.240
Nov 29 10:45:38 vibhu-HP-Z238-Microtower-Workstation sshd\[636\]: Failed password for invalid user jord from 119.29.65.240 port 55528 ssh2
...
2019-11-29 13:39:48
219.133.100.148 attackspambots
Nov 29 04:57:55 venus sshd\[11689\]: Invalid user rofizah from 219.133.100.148 port 18819
Nov 29 04:57:55 venus sshd\[11689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.133.100.148
Nov 29 04:57:57 venus sshd\[11689\]: Failed password for invalid user rofizah from 219.133.100.148 port 18819 ssh2
...
2019-11-29 13:42:16
197.156.67.250 attack
Nov 29 10:12:30 gw1 sshd[16915]: Failed password for root from 197.156.67.250 port 39560 ssh2
...
2019-11-29 13:19:58
185.211.245.198 attackbotsspam
Nov 29 05:58:33 andromeda postfix/smtpd\[14407\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: authentication failure
Nov 29 05:58:34 andromeda postfix/smtpd\[16073\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: authentication failure
Nov 29 05:58:34 andromeda postfix/smtpd\[15782\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: authentication failure
Nov 29 05:58:35 andromeda postfix/smtpd\[14407\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: authentication failure
Nov 29 05:58:35 andromeda postfix/smtpd\[15985\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: authentication failure
2019-11-29 13:22:05
49.150.1.55 attack
Lines containing failures of 49.150.1.55
Nov 29 05:53:57 srv02 sshd[31014]: Invalid user vagrant from 49.150.1.55 port 17193
Nov 29 05:54:00 srv02 sshd[31014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.150.1.55
Nov 29 05:54:02 srv02 sshd[31014]: Failed password for invalid user vagrant from 49.150.1.55 port 17193 ssh2
Nov 29 05:54:02 srv02 sshd[31014]: Connection closed by invalid user vagrant 49.150.1.55 port 17193 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.150.1.55
2019-11-29 13:18:32
206.189.129.38 attackbotsspam
Nov 28 18:54:52 kapalua sshd\[3728\]: Invalid user team-speak from 206.189.129.38
Nov 28 18:54:52 kapalua sshd\[3728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.129.38
Nov 28 18:54:53 kapalua sshd\[3728\]: Failed password for invalid user team-speak from 206.189.129.38 port 56300 ssh2
Nov 28 18:58:37 kapalua sshd\[4192\]: Invalid user soelverud from 206.189.129.38
Nov 28 18:58:37 kapalua sshd\[4192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.129.38
2019-11-29 13:19:45
163.172.204.185 attackspam
Nov 29 05:26:48 zeus sshd[7450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185 
Nov 29 05:26:50 zeus sshd[7450]: Failed password for invalid user jain from 163.172.204.185 port 47287 ssh2
Nov 29 05:29:57 zeus sshd[7493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185 
Nov 29 05:29:59 zeus sshd[7493]: Failed password for invalid user akahane from 163.172.204.185 port 37352 ssh2
2019-11-29 13:34:53
34.222.44.135 attackbotsspam
greta-birkner.de:443 34.222.44.135 - - [29/Nov/2019:05:57:56 +0100] "GET / HTTP/1.1" 403 5604 "-" "Go-http-client/1.1"
2019-11-29 13:44:09

Recently Reported IPs

143.189.157.90 128.20.184.209 76.9.2.104 133.64.200.148
139.97.83.45 196.240.106.186 215.7.146.183 31.132.131.193
15.19.236.152 169.221.112.170 213.245.100.77 239.112.72.160
162.247.118.7 155.115.204.61 140.172.248.134 19.39.153.6
7.141.23.54 248.33.166.178 138.38.146.165 104.190.166.11