Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dallas

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.118.22.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.118.22.109.			IN	A

;; AUTHORITY SECTION:
.			291	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010300 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 04 00:15:41 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 109.22.118.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.22.118.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.59.114.113 attack
2019-10-27T03:46:21.538264Z 7860389fafea New connection: 37.59.114.113:40476 (172.17.0.3:2222) [session: 7860389fafea]
2019-10-27T03:53:39.576051Z ef97cfd3ba3e New connection: 37.59.114.113:35464 (172.17.0.3:2222) [session: ef97cfd3ba3e]
2019-10-27 15:03:40
200.146.232.97 attack
Oct 27 05:53:30 www4 sshd\[65107\]: Invalid user wls from 200.146.232.97
Oct 27 05:53:30 www4 sshd\[65107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97
Oct 27 05:53:32 www4 sshd\[65107\]: Failed password for invalid user wls from 200.146.232.97 port 51656 ssh2
...
2019-10-27 15:06:09
104.244.77.210 attack
Invalid user fake from 104.244.77.210 port 33512
2019-10-27 15:34:55
176.99.138.154 attack
port scan and connect, tcp 23 (telnet)
2019-10-27 15:19:12
94.141.2.188 attackspam
SSH bruteforce
2019-10-27 14:56:18
218.4.196.178 attackbotsspam
Oct 27 07:22:07 server sshd\[20024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.196.178  user=root
Oct 27 07:22:09 server sshd\[20024\]: Failed password for root from 218.4.196.178 port 48645 ssh2
Oct 27 07:46:37 server sshd\[25737\]: Invalid user jet from 218.4.196.178
Oct 27 07:46:37 server sshd\[25737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.196.178 
Oct 27 07:46:39 server sshd\[25737\]: Failed password for invalid user jet from 218.4.196.178 port 58729 ssh2
...
2019-10-27 15:14:27
92.119.160.90 attack
Oct 27 06:07:24 h2177944 kernel: \[5028640.384490\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.90 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=30281 PROTO=TCP SPT=50663 DPT=1314 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 06:08:05 h2177944 kernel: \[5028681.449846\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.90 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=22244 PROTO=TCP SPT=50663 DPT=728 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 06:13:11 h2177944 kernel: \[5028987.505463\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.90 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=28646 PROTO=TCP SPT=50663 DPT=624 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 06:16:37 h2177944 kernel: \[5029192.906116\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.90 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=48004 PROTO=TCP SPT=50663 DPT=798 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 06:27:58 h2177944 kernel: \[5029874.146287\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.90 DST=85.214.117.9 LE
2019-10-27 15:14:09
51.79.65.158 attack
Oct 27 07:48:32 markkoudstaal sshd[30728]: Failed password for root from 51.79.65.158 port 55082 ssh2
Oct 27 07:52:33 markkoudstaal sshd[31106]: Failed password for root from 51.79.65.158 port 37492 ssh2
2019-10-27 15:25:44
128.199.157.28 attackspam
Oct 27 08:13:19 hosting sshd[17854]: Invalid user abot from 128.199.157.28 port 45504
...
2019-10-27 14:53:04
65.75.93.36 attackspam
Oct 27 05:25:46 mout sshd[20116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.75.93.36  user=root
Oct 27 05:25:48 mout sshd[20116]: Failed password for root from 65.75.93.36 port 36415 ssh2
2019-10-27 15:33:40
211.64.67.48 attackspam
Oct 26 21:09:22 kapalua sshd\[31317\]: Invalid user yuqetl4655 from 211.64.67.48
Oct 26 21:09:22 kapalua sshd\[31317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.64.67.48
Oct 26 21:09:24 kapalua sshd\[31317\]: Failed password for invalid user yuqetl4655 from 211.64.67.48 port 56278 ssh2
Oct 26 21:14:12 kapalua sshd\[31686\]: Invalid user Abcd1234% from 211.64.67.48
Oct 26 21:14:12 kapalua sshd\[31686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.64.67.48
2019-10-27 15:15:55
139.59.20.171 attackbotsspam
RDP Bruteforce
2019-10-27 15:20:18
183.82.121.34 attack
Oct 27 05:44:32 intra sshd\[48784\]: Invalid user peggy from 183.82.121.34Oct 27 05:44:33 intra sshd\[48784\]: Failed password for invalid user peggy from 183.82.121.34 port 30606 ssh2Oct 27 05:49:05 intra sshd\[48855\]: Invalid user unhappy from 183.82.121.34Oct 27 05:49:06 intra sshd\[48855\]: Failed password for invalid user unhappy from 183.82.121.34 port 49293 ssh2Oct 27 05:53:37 intra sshd\[48950\]: Invalid user sahabat from 183.82.121.34Oct 27 05:53:38 intra sshd\[48950\]: Failed password for invalid user sahabat from 183.82.121.34 port 11978 ssh2
...
2019-10-27 15:03:14
80.211.43.205 attackspambots
$f2bV_matches
2019-10-27 15:38:26
125.45.91.219 attack
" "
2019-10-27 14:54:52

Recently Reported IPs

185.164.72.42 201.243.202.175 124.105.235.98 201.131.181.38
47.74.43.182 118.161.89.147 221.178.236.73 190.118.212.160
107.115.213.114 81.91.106.21 158.170.147.188 167.130.202.180
176.111.64.64 192.102.199.14 79.40.109.180 95.231.176.100
23.192.130.213 192.2.63.45 23.240.224.219 73.144.211.11