Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.0.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60468
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.0.153.			IN	A

;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:23:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 153.0.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 153.0.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.223 attackbots
SSH login attempts.
2020-09-28 20:44:04
103.114.208.198 attack
SSH Bruteforce Attempt on Honeypot
2020-09-28 21:15:14
165.232.72.42 attackspam
uvcm 165.232.72.42 [28/Sep/2020:03:37:06 "-" "GET /wp-login.php?redirect_to=http%3A%2F%2Fbelajarweb.net%2Fwp-admin%2F&reauth=1 200 7203
165.232.72.42 [28/Sep/2020:03:37:09 "-" "GET /wp-login.php?redirect_to=http%3A%2F%2Fbelajarweb.net%2Fwp-admin%2F&reauth=1 200 4183
165.232.72.42 [28/Sep/2020:03:38:32 "-" "GET /wp-login.php?redirect_to=https%3A%2F%2Fsaveasbrand.com%2Fwp-admin%2F&reauth=1 200 4638
2020-09-28 20:48:59
167.172.201.94 attackspam
(sshd) Failed SSH login from 167.172.201.94 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 28 12:44:03 server2 sshd[703]: Invalid user jeffrey from 167.172.201.94 port 54364
Sep 28 12:44:05 server2 sshd[703]: Failed password for invalid user jeffrey from 167.172.201.94 port 54364 ssh2
Sep 28 12:54:28 server2 sshd[2451]: Invalid user www-data from 167.172.201.94 port 43738
Sep 28 12:54:29 server2 sshd[2451]: Failed password for invalid user www-data from 167.172.201.94 port 43738 ssh2
Sep 28 12:57:30 server2 sshd[2959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.201.94  user=root
2020-09-28 21:14:50
68.183.28.35 attackspam
Bruteforce detected by fail2ban
2020-09-28 21:16:51
45.148.121.43 attackbots
Brute force attempt on PBX
2020-09-28 20:57:33
112.85.42.176 attack
$f2bV_matches
2020-09-28 21:01:00
118.25.144.133 attack
SSH Bruteforce attack
2020-09-28 21:04:26
36.148.23.50 attack
Sep 28 04:09:37 Tower sshd[34539]: Connection from 36.148.23.50 port 41692 on 192.168.10.220 port 22 rdomain ""
Sep 28 04:09:38 Tower sshd[34539]: Invalid user ccc from 36.148.23.50 port 41692
Sep 28 04:09:38 Tower sshd[34539]: error: Could not get shadow information for NOUSER
Sep 28 04:09:38 Tower sshd[34539]: Failed password for invalid user ccc from 36.148.23.50 port 41692 ssh2
Sep 28 04:09:38 Tower sshd[34539]: Received disconnect from 36.148.23.50 port 41692:11: Bye Bye [preauth]
Sep 28 04:09:38 Tower sshd[34539]: Disconnected from invalid user ccc 36.148.23.50 port 41692 [preauth]
2020-09-28 21:01:37
49.88.112.72 attack
Sep 28 15:37:41 pkdns2 sshd\[26022\]: Failed password for root from 49.88.112.72 port 42897 ssh2Sep 28 15:42:58 pkdns2 sshd\[26292\]: Failed password for root from 49.88.112.72 port 23656 ssh2Sep 28 15:43:01 pkdns2 sshd\[26292\]: Failed password for root from 49.88.112.72 port 23656 ssh2Sep 28 15:43:04 pkdns2 sshd\[26292\]: Failed password for root from 49.88.112.72 port 23656 ssh2Sep 28 15:44:00 pkdns2 sshd\[26323\]: Failed password for root from 49.88.112.72 port 30666 ssh2Sep 28 15:44:02 pkdns2 sshd\[26323\]: Failed password for root from 49.88.112.72 port 30666 ssh2
...
2020-09-28 20:45:31
31.14.72.26 attack
Fail2Ban Ban Triggered
2020-09-28 21:06:25
45.148.122.184 attackspambots
1601291557 - 09/28/2020 18:12:37 Host: 45.148.122.184/45.148.122.184 Port: 6379 TCP Blocked
...
2020-09-28 20:50:25
112.85.42.110 attackbots
Sep 28 06:34:16 email sshd\[28612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.110  user=root
Sep 28 06:34:18 email sshd\[28612\]: Failed password for root from 112.85.42.110 port 55162 ssh2
Sep 28 06:34:22 email sshd\[28612\]: Failed password for root from 112.85.42.110 port 55162 ssh2
Sep 28 06:34:25 email sshd\[28612\]: Failed password for root from 112.85.42.110 port 55162 ssh2
Sep 28 06:34:36 email sshd\[28664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.110  user=root
...
2020-09-28 20:47:19
191.43.12.85 attackbots
Sep 28 13:33:09 srv-ubuntu-dev3 sshd[80507]: Invalid user jeff from 191.43.12.85
Sep 28 13:33:09 srv-ubuntu-dev3 sshd[80507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.43.12.85
Sep 28 13:33:09 srv-ubuntu-dev3 sshd[80507]: Invalid user jeff from 191.43.12.85
Sep 28 13:33:11 srv-ubuntu-dev3 sshd[80507]: Failed password for invalid user jeff from 191.43.12.85 port 35618 ssh2
Sep 28 13:37:38 srv-ubuntu-dev3 sshd[81076]: Invalid user usuario2 from 191.43.12.85
Sep 28 13:37:38 srv-ubuntu-dev3 sshd[81076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.43.12.85
Sep 28 13:37:38 srv-ubuntu-dev3 sshd[81076]: Invalid user usuario2 from 191.43.12.85
Sep 28 13:37:39 srv-ubuntu-dev3 sshd[81076]: Failed password for invalid user usuario2 from 191.43.12.85 port 39737 ssh2
Sep 28 13:42:04 srv-ubuntu-dev3 sshd[81596]: Invalid user sss from 191.43.12.85
...
2020-09-28 20:57:20
43.229.153.12 attackspambots
[ssh] SSH attack
2020-09-28 21:08:50

Recently Reported IPs

104.22.1.100 104.22.1.153 104.22.1.107 104.22.1.239
104.22.12.148 13.226.237.61 104.22.12.165 104.22.10.13
104.22.11.13 104.22.12.209 104.22.12.200 104.22.12.149
104.22.12.201 104.22.12.21 104.22.12.41 104.22.12.205
104.22.12.50 13.226.237.89 104.22.12.197 104.22.13.165