Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.118.22.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45159
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.118.22.0.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024112300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 23 16:25:28 CST 2024
;; MSG SIZE  rcvd: 105
Host info
0.22.118.104.in-addr.arpa domain name pointer a104-118-22-0.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
0.22.118.104.in-addr.arpa	name = a104-118-22-0.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
175.149.65.152 attack
[SPAM] I can not find
2019-06-24 12:57:55
195.170.15.66 attack
[SPAM] That's why I love our parties! Just look here
2019-06-24 12:48:34
177.11.168.42 attackspam
MagicSpam Rule: block_rbl_lists (dyna.spamrats.com); Spammer IP: 177.11.168.42
2019-06-24 12:57:28
142.93.219.227 attackspam
Invalid user admin from 142.93.219.227 port 52496
2019-06-24 13:17:29
193.232.106.88 attackspam
193.232.106.88 - - [24/Jun/2019:06:59:13 +0200] "GET /site/.env HTTP/1.1" 301 185 "-" "curl/7.35.0"
...
2019-06-24 13:05:05
165.227.151.59 attackspambots
Invalid user fletcher from 165.227.151.59 port 38898
2019-06-24 13:15:23
198.50.138.230 attackspam
Triggered by Fail2Ban
2019-06-24 13:04:20
177.155.94.7 attack
Invalid user admin from 177.155.94.7 port 58375
2019-06-24 13:14:22
104.248.134.125 attack
Jun 24 13:59:14 martinbaileyphotography sshd\[628\]: Invalid user fake from 104.248.134.125 port 43454
Jun 24 13:59:14 martinbaileyphotography sshd\[628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.125
Jun 24 13:59:16 martinbaileyphotography sshd\[628\]: Failed password for invalid user fake from 104.248.134.125 port 43454 ssh2
Jun 24 13:59:17 martinbaileyphotography sshd\[630\]: Invalid user ubnt from 104.248.134.125 port 50548
Jun 24 13:59:17 martinbaileyphotography sshd\[630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.125
...
2019-06-24 13:03:56
81.83.83.225 attackbots
Invalid user pi from 81.83.83.225 port 59882
2019-06-24 13:24:47
175.136.241.161 attack
Invalid user chemin from 175.136.241.161 port 46852
2019-06-24 13:07:38
82.102.14.79 attackbotsspam
" "
2019-06-24 13:10:38
178.62.117.82 attackspambots
Invalid user varza from 178.62.117.82 port 48256
2019-06-24 13:38:21
173.218.215.180 attackbotsspam
[SPAM] schedule an appointment for the weekend?
2019-06-24 12:59:11
174.83.76.187 attackbots
[SPAM] could you meet me today?
2019-06-24 12:58:34

Recently Reported IPs

220.71.21.99 216.200.24.11 208.164.116.111 136.6.74.0
130.116.83.74 128.121.30.150 147.36.198.198 224.0.0.249
171.111.197.161 170.111.63.2 43.85.93.11 2.70.100.73
2.254.127.200 190.12.241.101 176.185.107.228 182.10.72.198
43.74.101.119 142.8.44.126 171.114.83.24 68.110.80.212