Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.194.222.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.194.222.56.			IN	A

;; AUTHORITY SECTION:
.			463	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:46:17 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 56.222.194.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.222.194.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.145 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Failed password for root from 218.92.0.145 port 50688 ssh2
Failed password for root from 218.92.0.145 port 50688 ssh2
Failed password for root from 218.92.0.145 port 50688 ssh2
Failed password for root from 218.92.0.145 port 50688 ssh2
2019-11-14 02:14:52
165.22.144.206 attackspambots
Nov 13 15:44:26 sso sshd[29203]: Failed password for mysql from 165.22.144.206 port 52400 ssh2
...
2019-11-14 02:19:47
141.98.80.99 attackspambots
2019-11-14 02:39:40
34.94.208.18 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-14 02:25:26
113.209.128.30 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 02:03:47
113.118.214.27 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 02:31:26
190.117.62.241 attack
Nov 13 15:47:58 lnxmail61 sshd[13107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.117.62.241
2019-11-14 02:16:18
167.99.158.136 attackspam
Nov 13 16:50:42 MK-Soft-VM6 sshd[30588]: Failed password for mysql from 167.99.158.136 port 45644 ssh2
...
2019-11-14 02:28:32
107.191.100.109 attackbots
Invalid user jenny from 107.191.100.109 port 35562
2019-11-14 02:25:01
184.154.216.246 attackbots
Automatic report - XMLRPC Attack
2019-11-14 02:35:59
54.39.193.26 attack
Nov 13 18:47:04 SilenceServices sshd[29408]: Failed password for root from 54.39.193.26 port 26378 ssh2
Nov 13 18:50:18 SilenceServices sshd[31477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.193.26
Nov 13 18:50:20 SilenceServices sshd[31477]: Failed password for invalid user epanchi from 54.39.193.26 port 16492 ssh2
2019-11-14 02:05:19
63.251.152.106 attackspam
RDP Bruteforce
2019-11-14 02:35:07
222.162.70.249 attackbotsspam
failed_logins
2019-11-14 02:33:34
222.186.180.223 attackspambots
Nov 13 19:10:46 minden010 sshd[25105]: Failed password for root from 222.186.180.223 port 54172 ssh2
Nov 13 19:10:50 minden010 sshd[25105]: Failed password for root from 222.186.180.223 port 54172 ssh2
Nov 13 19:10:53 minden010 sshd[25105]: Failed password for root from 222.186.180.223 port 54172 ssh2
Nov 13 19:10:59 minden010 sshd[25105]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 54172 ssh2 [preauth]
...
2019-11-14 02:11:49
112.5.37.24 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 02:39:15

Recently Reported IPs

104.194.215.9 104.194.235.104 104.194.218.122 104.194.225.66
104.194.24.122 104.194.71.121 101.109.214.173 104.194.25.56
104.194.9.169 104.194.85.110 104.194.24.43 104.195.10.148
104.194.9.242 104.194.93.174 104.195.10.146 104.195.10.152
104.195.10.150 101.109.214.175 104.195.10.154 104.195.10.156