Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.22.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29989
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.22.113.			IN	A

;; AUTHORITY SECTION:
.			355	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 06:33:35 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 113.22.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.22.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.35.187.50 attackbots
Nov  8 18:25:03 sd-53420 sshd\[1316\]: User root from 188.35.187.50 not allowed because none of user's groups are listed in AllowGroups
Nov  8 18:25:03 sd-53420 sshd\[1316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.35.187.50  user=root
Nov  8 18:25:05 sd-53420 sshd\[1316\]: Failed password for invalid user root from 188.35.187.50 port 52076 ssh2
Nov  8 18:29:08 sd-53420 sshd\[2537\]: Invalid user comdd from 188.35.187.50
Nov  8 18:29:08 sd-53420 sshd\[2537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.35.187.50
...
2019-11-09 02:00:28
186.74.247.50 attackbots
Automatic report - Banned IP Access
2019-11-09 02:04:38
5.189.170.13 attack
Automatic report - SSH Brute-Force Attack
2019-11-09 02:03:34
177.248.128.203 attack
Brute force attempt
2019-11-09 01:33:39
54.39.51.31 attack
Apr 28 07:37:11 vtv3 sshd\[19361\]: Invalid user tomcats from 54.39.51.31 port 52192
Apr 28 07:37:11 vtv3 sshd\[19361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.51.31
Apr 28 07:37:13 vtv3 sshd\[19361\]: Failed password for invalid user tomcats from 54.39.51.31 port 52192 ssh2
Apr 28 07:42:34 vtv3 sshd\[21969\]: Invalid user elvis from 54.39.51.31 port 45548
Apr 28 07:42:34 vtv3 sshd\[21969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.51.31
Apr 28 07:52:56 vtv3 sshd\[26962\]: Invalid user que from 54.39.51.31 port 52860
Apr 28 07:52:56 vtv3 sshd\[26962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.51.31
Apr 28 07:52:59 vtv3 sshd\[26962\]: Failed password for invalid user que from 54.39.51.31 port 52860 ssh2
Apr 28 07:55:10 vtv3 sshd\[28222\]: Invalid user kw from 54.39.51.31 port 48728
Apr 28 07:55:10 vtv3 sshd\[28222\]: pam_unix\(sshd:auth\): aut
2019-11-09 01:57:00
41.137.137.92 attack
Nov  8 07:16:21 web1 sshd\[4506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.137.137.92  user=root
Nov  8 07:16:24 web1 sshd\[4506\]: Failed password for root from 41.137.137.92 port 50330 ssh2
Nov  8 07:25:28 web1 sshd\[5293\]: Invalid user sadan from 41.137.137.92
Nov  8 07:25:28 web1 sshd\[5293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.137.137.92
Nov  8 07:25:30 web1 sshd\[5293\]: Failed password for invalid user sadan from 41.137.137.92 port 41302 ssh2
2019-11-09 01:30:02
112.6.231.114 attackspambots
Nov  8 17:00:25 lnxmysql61 sshd[6988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.6.231.114
2019-11-09 02:06:40
200.127.33.2 attackbotsspam
2019-11-08T17:12:45.845018shield sshd\[6609\]: Invalid user ftp1 from 200.127.33.2 port 33006
2019-11-08T17:12:45.850773shield sshd\[6609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-127-33-2.cab.prima.net.ar
2019-11-08T17:12:47.928787shield sshd\[6609\]: Failed password for invalid user ftp1 from 200.127.33.2 port 33006 ssh2
2019-11-08T17:17:43.034807shield sshd\[7491\]: Invalid user finance from 200.127.33.2 port 42708
2019-11-08T17:17:43.039007shield sshd\[7491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-127-33-2.cab.prima.net.ar
2019-11-09 01:27:24
106.54.238.222 attack
Nov  8 18:39:37 km20725 sshd\[7745\]: Invalid user user from 106.54.238.222Nov  8 18:39:39 km20725 sshd\[7745\]: Failed password for invalid user user from 106.54.238.222 port 36986 ssh2Nov  8 18:45:47 km20725 sshd\[8094\]: Invalid user wildan from 106.54.238.222Nov  8 18:45:49 km20725 sshd\[8094\]: Failed password for invalid user wildan from 106.54.238.222 port 40110 ssh2
...
2019-11-09 01:58:17
218.28.168.4 attackbots
Nov  8 17:12:07 game-panel sshd[7116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.168.4
Nov  8 17:12:10 game-panel sshd[7116]: Failed password for invalid user z from 218.28.168.4 port 13186 ssh2
Nov  8 17:17:14 game-panel sshd[7259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.168.4
2019-11-09 01:34:49
183.82.252.147 attackbots
SMB Server BruteForce Attack
2019-11-09 01:46:36
139.217.234.68 attack
$f2bV_matches
2019-11-09 01:56:24
45.89.106.160 attackspam
Connection by 45.89.106.160 on port: 9000 got caught by honeypot at 11/8/2019 1:38:08 PM
2019-11-09 01:33:19
128.199.138.31 attackspam
Nov  8 06:43:08 web1 sshd\[1501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.31  user=root
Nov  8 06:43:10 web1 sshd\[1501\]: Failed password for root from 128.199.138.31 port 50161 ssh2
Nov  8 06:47:49 web1 sshd\[1949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.31  user=root
Nov  8 06:47:51 web1 sshd\[1949\]: Failed password for root from 128.199.138.31 port 40821 ssh2
Nov  8 06:52:21 web1 sshd\[2362\]: Invalid user 123456 from 128.199.138.31
Nov  8 06:52:21 web1 sshd\[2362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.31
2019-11-09 01:40:45
177.44.18.124 attack
postfix (unknown user, SPF fail or relay access denied)
2019-11-09 02:05:34

Recently Reported IPs

245.58.31.231 104.16.22.114 104.160.1.119 104.160.1.152
104.160.1.47 104.160.1.8 104.160.14.66 104.160.14.9
104.160.19.38 104.164.122.254 104.164.122.59 104.164.157.47
104.164.192.25 104.164.207.10 225.59.117.197 104.164.207.124
104.165.108.105 104.165.108.119 104.165.108.148 104.166.135.125