Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.22.136.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62770
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.22.136.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 05:33:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
252.136.22.220.in-addr.arpa domain name pointer softbank220022136252.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
252.136.22.220.in-addr.arpa	name = softbank220022136252.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.216.109.154 attack
Invalid user pi from 83.216.109.154 port 55064
2019-06-25 03:19:00
68.183.80.232 attack
Invalid user admin from 68.183.80.232 port 44180
2019-06-25 03:44:49
73.22.244.37 attack
Invalid user osbash from 73.22.244.37 port 59794
2019-06-25 03:34:32
138.68.171.25 attack
Jun 24 19:27:47 vps65 sshd\[6666\]: Invalid user se from 138.68.171.25 port 43200
Jun 24 19:27:47 vps65 sshd\[6666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.171.25
...
2019-06-25 03:53:11
221.160.100.14 attackspambots
Jun 24 14:43:18 debian sshd\[4688\]: Invalid user WKADMIN from 221.160.100.14 port 41912
Jun 24 14:43:18 debian sshd\[4688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14
Jun 24 14:43:20 debian sshd\[4688\]: Failed password for invalid user WKADMIN from 221.160.100.14 port 41912 ssh2
...
2019-06-25 03:38:39
117.50.38.202 attack
Invalid user kafka from 117.50.38.202 port 44204
2019-06-25 03:29:11
159.65.82.105 attackbots
Invalid user ethos from 159.65.82.105 port 48052
2019-06-25 03:50:47
106.12.28.36 attack
Jun 24 20:43:37 s64-1 sshd[29085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.36
Jun 24 20:43:39 s64-1 sshd[29085]: Failed password for invalid user cndunda from 106.12.28.36 port 33174 ssh2
Jun 24 20:45:23 s64-1 sshd[29090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.36
...
2019-06-25 03:31:57
177.39.84.130 attackspambots
Invalid user remi from 177.39.84.130 port 41681
2019-06-25 03:25:46
113.53.75.6 attackbotsspam
Invalid user demo from 113.53.75.6 port 48604
2019-06-25 03:53:26
178.128.81.125 attackbots
IP attempted unauthorised action
2019-06-25 03:49:09
51.75.125.124 attackbotsspam
Attempted SSH login
2019-06-25 03:35:44
116.2.141.86 attackbotsspam
:
2019-06-25 03:15:51
52.231.25.242 attack
2019-06-25T00:45:57.083421enmeeting.mahidol.ac.th sshd\[26680\]: Invalid user samba from 52.231.25.242 port 57802
2019-06-25T00:45:57.097543enmeeting.mahidol.ac.th sshd\[26680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.25.242
2019-06-25T00:45:59.153549enmeeting.mahidol.ac.th sshd\[26680\]: Failed password for invalid user samba from 52.231.25.242 port 57802 ssh2
...
2019-06-25 03:21:07
61.155.100.19 attackspambots
Jun 24 21:15:20 lnxweb62 sshd[28237]: Failed password for list from 61.155.100.19 port 55044 ssh2
Jun 24 21:15:20 lnxweb62 sshd[28237]: Failed password for list from 61.155.100.19 port 55044 ssh2
2019-06-25 03:34:56

Recently Reported IPs

33.6.234.15 220.117.161.15 21.199.115.33 34.194.215.196
205.13.72.247 22.37.161.75 178.224.222.64 180.98.55.117
33.34.128.19 107.248.8.191 39.148.166.90 175.63.8.48
121.84.203.204 137.244.22.228 171.248.254.220 157.230.95.146
153.34.89.165 152.211.97.11 174.162.36.103 54.49.136.80