Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.0.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62413
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.0.148.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040702 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 08 02:34:45 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 148.0.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.0.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.74.198.45 attack
Telnetd brute force attack detected by fail2ban
2019-11-22 16:58:13
192.241.249.19 attack
2019-11-22T08:38:17.129935abusebot-2.cloudsearch.cf sshd\[6768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=picasso.logoworks.com  user=root
2019-11-22 17:06:48
125.212.203.113 attackbotsspam
2019-11-22T08:31:11.316039abusebot-5.cloudsearch.cf sshd\[29914\]: Invalid user aidan from 125.212.203.113 port 35896
2019-11-22 16:45:27
179.189.190.166 attackspam
Automatic report - Port Scan Attack
2019-11-22 16:39:02
83.97.20.46 attackspambots
Fail2Ban Ban Triggered
2019-11-22 16:48:31
202.122.36.35 attack
Lines containing failures of 202.122.36.35
Nov 20 19:45:40 smtp-out sshd[10039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.122.36.35  user=backup
Nov 20 19:45:41 smtp-out sshd[10039]: Failed password for backup from 202.122.36.35 port 46662 ssh2
Nov 20 19:45:41 smtp-out sshd[10039]: Received disconnect from 202.122.36.35 port 46662:11: Bye Bye [preauth]
Nov 20 19:45:41 smtp-out sshd[10039]: Disconnected from authenticating user backup 202.122.36.35 port 46662 [preauth]
Nov 20 19:55:02 smtp-out sshd[10343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.122.36.35  user=r.r
Nov 20 19:55:04 smtp-out sshd[10343]: Failed password for r.r from 202.122.36.35 port 51718 ssh2
Nov 20 19:55:04 smtp-out sshd[10343]: Received disconnect from 202.122.36.35 port 51718:11: Bye Bye [preauth]
Nov 20 19:55:04 smtp-out sshd[10343]: Disconnected from authenticating user r.r 202.122.36.35 port 51718........
------------------------------
2019-11-22 16:43:34
121.178.212.69 attackspam
Nov 21 22:45:35 php1 sshd\[3075\]: Invalid user uv from 121.178.212.69
Nov 21 22:45:35 php1 sshd\[3075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.178.212.69
Nov 21 22:45:37 php1 sshd\[3075\]: Failed password for invalid user uv from 121.178.212.69 port 56468 ssh2
Nov 21 22:53:41 php1 sshd\[3752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.178.212.69  user=root
Nov 21 22:53:43 php1 sshd\[3752\]: Failed password for root from 121.178.212.69 port 46583 ssh2
2019-11-22 17:04:56
49.51.249.186 attackspam
Invalid user villavicencio from 49.51.249.186 port 59948
2019-11-22 16:38:27
119.29.128.126 attackbotsspam
2019-11-22T08:35:58.891071shield sshd\[26358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.128.126  user=root
2019-11-22T08:36:01.253511shield sshd\[26358\]: Failed password for root from 119.29.128.126 port 36492 ssh2
2019-11-22T08:41:25.342422shield sshd\[26961\]: Invalid user oberkirch from 119.29.128.126 port 43186
2019-11-22T08:41:25.346658shield sshd\[26961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.128.126
2019-11-22T08:41:27.934548shield sshd\[26961\]: Failed password for invalid user oberkirch from 119.29.128.126 port 43186 ssh2
2019-11-22 16:58:55
106.52.239.33 attackspambots
Nov 22 09:15:31 ns382633 sshd\[31999\]: Invalid user iljime7 from 106.52.239.33 port 40794
Nov 22 09:15:31 ns382633 sshd\[31999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.239.33
Nov 22 09:15:33 ns382633 sshd\[31999\]: Failed password for invalid user iljime7 from 106.52.239.33 port 40794 ssh2
Nov 22 09:27:02 ns382633 sshd\[1703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.239.33  user=root
Nov 22 09:27:03 ns382633 sshd\[1703\]: Failed password for root from 106.52.239.33 port 51614 ssh2
2019-11-22 16:37:17
206.81.7.42 attackbots
Nov 22 09:28:43 srv-ubuntu-dev3 sshd[20471]: Invalid user crashweb from 206.81.7.42
Nov 22 09:28:43 srv-ubuntu-dev3 sshd[20471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.7.42
Nov 22 09:28:43 srv-ubuntu-dev3 sshd[20471]: Invalid user crashweb from 206.81.7.42
Nov 22 09:28:45 srv-ubuntu-dev3 sshd[20471]: Failed password for invalid user crashweb from 206.81.7.42 port 46848 ssh2
Nov 22 09:31:50 srv-ubuntu-dev3 sshd[20705]: Invalid user jichuan from 206.81.7.42
Nov 22 09:31:50 srv-ubuntu-dev3 sshd[20705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.7.42
Nov 22 09:31:50 srv-ubuntu-dev3 sshd[20705]: Invalid user jichuan from 206.81.7.42
Nov 22 09:31:51 srv-ubuntu-dev3 sshd[20705]: Failed password for invalid user jichuan from 206.81.7.42 port 54438 ssh2
Nov 22 09:34:46 srv-ubuntu-dev3 sshd[20923]: Invalid user kellia from 206.81.7.42
...
2019-11-22 16:37:47
2001:4cc8:1:1:250:56ff:fe8d:ba40 attackspambots
xmlrpc attack
2019-11-22 16:26:55
52.35.136.194 attack
11/22/2019-09:31:02.483081 52.35.136.194 Protocol: 6 SURICATA TLS invalid record/traffic
2019-11-22 17:03:17
190.195.131.249 attackspambots
Nov 22 13:56:25 areeb-Workstation sshd[8982]: Failed password for root from 190.195.131.249 port 46108 ssh2
Nov 22 14:02:25 areeb-Workstation sshd[10264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.195.131.249
...
2019-11-22 17:07:13
180.124.29.70 attackbots
Telnetd brute force attack detected by fail2ban
2019-11-22 16:39:39

Recently Reported IPs

104.219.42.190 104.22.1.148 104.22.10.57 104.22.11.57
104.22.12.106 104.22.13.106 104.22.14.100 104.22.14.28
104.22.15.100 104.22.15.28 104.22.18.248 104.22.19.248
104.22.2.159 104.22.3.159 104.22.35.219 104.22.36.236
104.22.37.236 104.22.38.67 104.22.39.67 104.22.40.122