Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dunedin

Region: Otago

Country: New Zealand

Internet Service Provider: Spark

Hostname: unknown

Organization: Spark New Zealand Trading Ltd.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.152.198.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51806
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;222.152.198.19.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 00:51:32 CST 2019
;; MSG SIZE  rcvd: 118
Host info
19.198.152.222.in-addr.arpa domain name pointer 222-152-198-19-fibre.sparkbb.co.nz.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
19.198.152.222.in-addr.arpa	name = 222-152-198-19-fibre.sparkbb.co.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
196.179.22.198 attackspam
Email rejected due to spam filtering
2020-02-26 08:41:21
222.103.227.164 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-26 08:19:20
27.59.142.199 attackspambots
Unauthorized connection attempt from IP address 27.59.142.199 on Port 445(SMB)
2020-02-26 08:47:43
59.124.154.223 attackspambots
Unauthorized connection attempt from IP address 59.124.154.223 on Port 445(SMB)
2020-02-26 08:38:07
171.248.145.126 attackbots
Automatic report - Port Scan Attack
2020-02-26 08:28:33
122.199.152.114 attackspambots
Feb 25 14:07:49 hpm sshd\[17300\]: Invalid user Ronald from 122.199.152.114
Feb 25 14:07:49 hpm sshd\[17300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.199.152.114
Feb 25 14:07:51 hpm sshd\[17300\]: Failed password for invalid user Ronald from 122.199.152.114 port 31336 ssh2
Feb 25 14:17:41 hpm sshd\[18042\]: Invalid user support from 122.199.152.114
Feb 25 14:17:41 hpm sshd\[18042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.199.152.114
2020-02-26 08:37:25
93.131.128.69 attack
Email rejected due to spam filtering
2020-02-26 08:37:44
222.186.173.154 attack
Feb 25 20:59:28 vps46666688 sshd[11290]: Failed password for root from 222.186.173.154 port 53270 ssh2
Feb 25 20:59:41 vps46666688 sshd[11290]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 53270 ssh2 [preauth]
...
2020-02-26 08:10:17
51.235.144.122 attack
Unauthorized connection attempt from IP address 51.235.144.122 on Port 445(SMB)
2020-02-26 08:14:00
125.16.182.132 attackspam
Unauthorized connection attempt from IP address 125.16.182.132 on Port 445(SMB)
2020-02-26 08:32:01
198.2.75.154 attackspambots
Honeypot attack, port: 5555, PTR: dhcp-198-2-75-154.cable.user.start.ca.
2020-02-26 08:22:17
156.96.44.14 attack
DATE:2020-02-25 17:29:28, IP:156.96.44.14, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-26 08:08:34
49.231.222.13 attackspambots
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2020-02-26 08:21:59
197.164.164.52 attackspam
Unauthorized connection attempt from IP address 197.164.164.52 on Port 445(SMB)
2020-02-26 08:16:37
114.35.91.107 attackbotsspam
suspicious action Tue, 25 Feb 2020 13:31:08 -0300
2020-02-26 08:30:51

Recently Reported IPs

150.241.76.186 198.64.5.59 104.248.170.45 65.246.5.153
185.228.82.5 75.3.244.114 79.133.118.52 2003:c0:3f19:db00:5526:a5c:fb6b:ae18
174.155.48.124 111.62.41.186 191.90.214.73 194.57.85.84
5.56.133.58 221.203.166.226 140.131.4.89 82.24.140.81
180.91.139.170 143.66.179.28 45.88.195.80 144.166.56.117