Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.162.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13867
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.162.22.			IN	A

;; AUTHORITY SECTION:
.			216	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091402 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 12:34:39 CST 2022
;; MSG SIZE  rcvd: 107
Host info
22.162.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.162.149.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.13.209.154 attackspambots
Dec  8 04:50:22 wbs sshd\[26096\]: Invalid user olmedo from 83.13.209.154
Dec  8 04:50:22 wbs sshd\[26096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fib154.internetdsl.tpnet.pl
Dec  8 04:50:24 wbs sshd\[26096\]: Failed password for invalid user olmedo from 83.13.209.154 port 48922 ssh2
Dec  8 04:56:24 wbs sshd\[26645\]: Invalid user test from 83.13.209.154
Dec  8 04:56:24 wbs sshd\[26645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fib154.internetdsl.tpnet.pl
2019-12-08 23:11:42
202.153.128.61 attackbots
SSH Brute Force, server-1 sshd[1733]: Failed password for invalid user calmer from 202.153.128.61 port 41198 ssh2
2019-12-08 23:21:23
108.235.160.215 attackbotsspam
Dec  8 15:13:06 XXX sshd[5224]: Invalid user gabey from 108.235.160.215 port 42490
2019-12-08 23:11:57
182.136.11.37 attackbots
Scanning
2019-12-08 22:55:07
182.151.214.107 attackspambots
SSH Brute Force, server-1 sshd[1689]: Failed password for root from 182.151.214.107 port 24699 ssh2
2019-12-08 23:24:10
2.7.19.144 attackspam
SSH Brute Force, server-1 sshd[2154]: Failed password for invalid user user from 2.7.19.144 port 37202 ssh2
2019-12-08 23:34:36
180.76.141.184 attack
SSH Brute Force, server-1 sshd[1719]: Failed password for root from 180.76.141.184 port 35782 ssh2
2019-12-08 23:24:33
49.88.112.58 attackspam
Dec  6 23:13:07 mail sshd[3662]: Failed password for root from 49.88.112.58 port 4818 ssh2
Dec  6 23:13:12 mail sshd[3662]: Failed password for root from 49.88.112.58 port 4818 ssh2
Dec  6 23:13:15 mail sshd[3662]: Failed password for root from 49.88.112.58 port 4818 ssh2
Dec  6 23:13:19 mail sshd[3662]: Failed password for root from 49.88.112.58 port 4818 ssh2
2019-12-08 23:33:12
218.92.0.154 attack
Dec  8 05:03:20 web1 sshd\[9066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154  user=root
Dec  8 05:03:21 web1 sshd\[9066\]: Failed password for root from 218.92.0.154 port 53527 ssh2
Dec  8 05:03:31 web1 sshd\[9066\]: Failed password for root from 218.92.0.154 port 53527 ssh2
Dec  8 05:03:35 web1 sshd\[9066\]: Failed password for root from 218.92.0.154 port 53527 ssh2
Dec  8 05:03:43 web1 sshd\[9077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154  user=root
2019-12-08 23:20:03
218.92.0.135 attackbots
Dec  8 16:03:20 fr01 sshd[29477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135  user=root
Dec  8 16:03:21 fr01 sshd[29477]: Failed password for root from 218.92.0.135 port 64276 ssh2
...
2019-12-08 23:08:16
165.227.46.221 attackbotsspam
Dec  8 04:43:47 kapalua sshd\[9258\]: Invalid user saikumar from 165.227.46.221
Dec  8 04:43:47 kapalua sshd\[9258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=id.cast-soft.com
Dec  8 04:43:49 kapalua sshd\[9258\]: Failed password for invalid user saikumar from 165.227.46.221 port 33866 ssh2
Dec  8 04:50:41 kapalua sshd\[10031\]: Invalid user 23456 from 165.227.46.221
Dec  8 04:50:41 kapalua sshd\[10031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=id.cast-soft.com
2019-12-08 22:57:21
129.204.78.236 attackspambots
2019-12-08T14:23:04.815232abusebot.cloudsearch.cf sshd\[23591\]: Invalid user mago from 129.204.78.236 port 36076
2019-12-08 22:50:48
111.230.143.110 attackbots
web-1 [ssh] SSH Attack
2019-12-08 23:29:26
182.180.9.106 attack
Dec  8 16:10:31 server sshd\[1894\]: Invalid user user from 182.180.9.106
Dec  8 16:10:31 server sshd\[1894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.9.106 
Dec  8 16:10:33 server sshd\[1894\]: Failed password for invalid user user from 182.180.9.106 port 58924 ssh2
Dec  8 18:15:44 server sshd\[5258\]: Invalid user user from 182.180.9.106
Dec  8 18:15:44 server sshd\[5258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.9.106 
...
2019-12-08 23:23:33
119.60.255.90 attack
Dec  8 14:49:00 localhost sshd\[35795\]: Invalid user tanahashi from 119.60.255.90 port 34728
Dec  8 14:49:00 localhost sshd\[35795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.60.255.90
Dec  8 14:49:02 localhost sshd\[35795\]: Failed password for invalid user tanahashi from 119.60.255.90 port 34728 ssh2
Dec  8 14:56:29 localhost sshd\[36033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.60.255.90  user=root
Dec  8 14:56:30 localhost sshd\[36033\]: Failed password for root from 119.60.255.90 port 58132 ssh2
...
2019-12-08 23:02:48

Recently Reported IPs

34.92.65.74 45.131.109.253 217.146.223.85 45.93.249.158
68.183.228.158 83.252.44.192 110.183.153.161 35.234.242.22
220.133.249.85 46.100.59.224 82.81.59.95 124.119.71.43
120.7.249.211 14.116.214.140 93.119.105.10 103.15.240.90
94.197.213.78 75.98.162.127 81.69.245.183 86.189.250.159