Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.0.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.0.47.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:22:29 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 47.0.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 47.0.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.112.73.157 attack
Oct  9 07:20:55 dhoomketu sshd[3681888]: Failed password for invalid user laraht from 193.112.73.157 port 59338 ssh2
Oct  9 07:25:11 dhoomketu sshd[3681961]: Invalid user support from 193.112.73.157 port 33280
Oct  9 07:25:11 dhoomketu sshd[3681961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.73.157 
Oct  9 07:25:11 dhoomketu sshd[3681961]: Invalid user support from 193.112.73.157 port 33280
Oct  9 07:25:12 dhoomketu sshd[3681961]: Failed password for invalid user support from 193.112.73.157 port 33280 ssh2
...
2020-10-10 06:24:26
142.93.68.181 attack
 TCP (SYN) 142.93.68.181:58096 -> port 5163, len 44
2020-10-10 06:23:00
90.110.31.70 attack
SSH Bruteforce attempt
2020-10-10 06:31:43
88.201.180.248 attack
Oct  9 22:12:21 onepixel sshd[1822075]: Invalid user mailnull from 88.201.180.248 port 49450
Oct  9 22:12:21 onepixel sshd[1822075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.201.180.248 
Oct  9 22:12:21 onepixel sshd[1822075]: Invalid user mailnull from 88.201.180.248 port 49450
Oct  9 22:12:22 onepixel sshd[1822075]: Failed password for invalid user mailnull from 88.201.180.248 port 49450 ssh2
Oct  9 22:15:44 onepixel sshd[1822562]: Invalid user nancy from 88.201.180.248 port 53090
2020-10-10 06:20:11
120.132.99.101 attackspambots
Oct  9 20:41:45 main sshd[14160]: Failed password for invalid user vnc from 120.132.99.101 port 36008 ssh2
Oct  9 20:42:53 main sshd[14288]: Failed password for invalid user upload from 120.132.99.101 port 42208 ssh2
Oct  9 20:45:48 main sshd[14500]: Failed password for invalid user test from 120.132.99.101 port 10491 ssh2
Oct  9 20:46:34 main sshd[14520]: Failed password for invalid user tomcat from 120.132.99.101 port 16687 ssh2
Oct  9 20:47:19 main sshd[14552]: Failed password for invalid user admin from 120.132.99.101 port 22887 ssh2
Oct  9 20:51:48 main sshd[14752]: Failed password for invalid user test from 120.132.99.101 port 60061 ssh2
Oct  9 20:57:13 main sshd[14998]: Failed password for invalid user deployer from 120.132.99.101 port 46930 ssh2
Oct  9 20:58:40 main sshd[15056]: Failed password for invalid user adm from 120.132.99.101 port 59324 ssh2
Oct  9 21:00:06 main sshd[15124]: Failed password for invalid user manager from 120.132.99.101 port 15215 ssh2
2020-10-10 06:45:08
93.70.247.217 attackbots
Port probing on unauthorized port 5555
2020-10-10 06:28:48
222.186.42.7 attackbotsspam
Oct 10 00:45:14 eventyay sshd[15441]: Failed password for root from 222.186.42.7 port 27452 ssh2
Oct 10 00:45:15 eventyay sshd[15441]: Failed password for root from 222.186.42.7 port 27452 ssh2
Oct 10 00:45:18 eventyay sshd[15441]: Failed password for root from 222.186.42.7 port 27452 ssh2
...
2020-10-10 06:45:39
106.12.205.108 attack
[f2b] sshd bruteforce, retries: 1
2020-10-10 06:42:10
58.229.114.170 attackbots
Automatic report BANNED IP
2020-10-10 06:16:54
123.206.188.77 attackspambots
Oct  9 20:02:12 ns382633 sshd\[17011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.188.77  user=root
Oct  9 20:02:14 ns382633 sshd\[17011\]: Failed password for root from 123.206.188.77 port 41665 ssh2
Oct  9 20:06:06 ns382633 sshd\[17692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.188.77  user=root
Oct  9 20:06:08 ns382633 sshd\[17692\]: Failed password for root from 123.206.188.77 port 59213 ssh2
Oct  9 20:07:22 ns382633 sshd\[17817\]: Invalid user oleta from 123.206.188.77 port 37217
Oct  9 20:07:22 ns382633 sshd\[17817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.188.77
2020-10-10 06:11:50
64.225.37.169 attack
Oct  9 23:39:45 vpn01 sshd[8842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.37.169
Oct  9 23:39:46 vpn01 sshd[8842]: Failed password for invalid user lobby01 from 64.225.37.169 port 36866 ssh2
...
2020-10-10 06:23:59
58.213.116.170 attackbots
Oct  9 23:49:33 abendstille sshd\[3804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.116.170  user=root
Oct  9 23:49:35 abendstille sshd\[3804\]: Failed password for root from 58.213.116.170 port 33544 ssh2
Oct  9 23:52:52 abendstille sshd\[6739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.116.170  user=root
Oct  9 23:52:54 abendstille sshd\[6739\]: Failed password for root from 58.213.116.170 port 57158 ssh2
Oct  9 23:56:12 abendstille sshd\[10037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.116.170  user=root
...
2020-10-10 06:20:29
121.224.10.82 attackbots
2020-10-09T21:25:55.562377h2857900.stratoserver.net sshd[7236]: Invalid user pi from 121.224.10.82 port 41796
2020-10-09T21:25:55.584322h2857900.stratoserver.net sshd[7237]: Invalid user pi from 121.224.10.82 port 41798
...
2020-10-10 06:34:37
13.78.175.148 attackbotsspam
Oct  9 11:41:15 vps46666688 sshd[18578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.78.175.148
Oct  9 11:41:17 vps46666688 sshd[18578]: Failed password for invalid user prueba1 from 13.78.175.148 port 52370 ssh2
...
2020-10-10 06:11:00
95.6.45.123 attack
Unauthorized connection attempt detected from IP address 95.6.45.123 to port 23
2020-10-10 06:21:07

Recently Reported IPs

104.22.0.46 104.22.0.43 104.22.0.50 104.22.0.49
104.22.0.51 104.22.0.58 104.22.0.59 104.22.0.68
104.22.0.62 104.22.0.61 104.22.0.72 104.22.0.75
104.22.0.7 104.22.0.79 104.22.0.78 104.22.0.8
104.22.0.70 104.22.0.85 104.22.0.90 104.22.0.83