Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.1.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38682
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.1.7.			IN	A

;; AUTHORITY SECTION:
.			559	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:23:04 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 7.1.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.1.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.68.173.108 attack
Aug  8 05:34:33 ns341937 sshd[25229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.173.108
Aug  8 05:34:34 ns341937 sshd[25229]: Failed password for invalid user rene from 51.68.173.108 port 44158 ssh2
Aug  8 05:39:45 ns341937 sshd[26192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.173.108
...
2019-08-08 13:10:49
106.111.210.114 attack
Brute force SMTP login attempts.
2019-08-08 13:15:36
51.15.58.201 attack
Aug  8 07:06:11 lnxmysql61 sshd[26467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.58.201
Aug  8 07:06:12 lnxmysql61 sshd[26467]: Failed password for invalid user administrador from 51.15.58.201 port 35862 ssh2
Aug  8 07:10:07 lnxmysql61 sshd[26903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.58.201
2019-08-08 13:11:18
168.128.13.253 attackspam
Aug  8 06:49:00 OPSO sshd\[3575\]: Invalid user user from 168.128.13.253 port 39002
Aug  8 06:49:00 OPSO sshd\[3575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.13.253
Aug  8 06:49:01 OPSO sshd\[3575\]: Failed password for invalid user user from 168.128.13.253 port 39002 ssh2
Aug  8 06:54:23 OPSO sshd\[4244\]: Invalid user maxime from 168.128.13.253 port 60764
Aug  8 06:54:23 OPSO sshd\[4244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.13.253
2019-08-08 12:58:14
122.195.200.148 attackbotsspam
2019-08-08T05:01:56.178268abusebot-4.cloudsearch.cf sshd\[14823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148  user=root
2019-08-08 13:06:00
86.56.81.242 attack
SSH Brute-Force reported by Fail2Ban
2019-08-08 13:38:33
180.183.225.52 attackspambots
Unauthorised access (Aug  8) SRC=180.183.225.52 LEN=52 TTL=114 ID=28544 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-08 13:12:15
195.206.105.217 attackbotsspam
2019-08-08T06:17:10.495240+01:00 suse sshd[22451]: User root from 195.206.105.217 not allowed because not listed in AllowUsers
2019-08-08T06:17:12.980993+01:00 suse sshd[22453]: User root from 195.206.105.217 not allowed because not listed in AllowUsers
2019-08-08T06:17:12.980993+01:00 suse sshd[22453]: User root from 195.206.105.217 not allowed because not listed in AllowUsers
2019-08-08T06:17:15.543320+01:00 suse sshd[22453]: error: PAM: Authentication failure for illegal user root from 195.206.105.217
...
2019-08-08 13:18:23
185.234.219.65 attack
2019-08-08 07:17:38 dovecot_login authenticator failed for (95.216.208.141) [185.234.219.65]: 535 Incorrect authentication data (set_id=user1)
...
2019-08-08 13:11:53
49.88.112.65 attackspambots
Aug  8 00:49:09 plusreed sshd[12266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Aug  8 00:49:11 plusreed sshd[12266]: Failed password for root from 49.88.112.65 port 49804 ssh2
...
2019-08-08 12:58:39
103.10.30.224 attack
Aug  8 06:18:29 debian sshd\[18778\]: Invalid user amd from 103.10.30.224 port 53700
Aug  8 06:18:29 debian sshd\[18778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.30.224
...
2019-08-08 13:20:02
120.151.29.128 attackspambots
120.151.29.128 - - \[08/Aug/2019:04:20:13 +0000\] "POST /xmlrpc.php HTTP/1.1" 301 603 "-" "Mozilla/5.0 \(X11\; Linux i686\; rv:2.0.1\) Gecko/20100101 Firefox/4.0.1"
120.151.29.128 - - \[08/Aug/2019:04:21:13 +0000\] "POST /xmlrpc.php HTTP/1.1" 301 603 "-" "Mozilla/5.0 \(X11\; Linux i686\; rv:2.0.1\) Gecko/20100101 Firefox/4.0.1"
120.151.29.128 - - \[08/Aug/2019:04:22:14 +0000\] "POST /xmlrpc.php HTTP/1.1" 301 603 "-" "Mozilla/5.0 \(X11\; Linux i686\; rv:2.0.1\) Gecko/20100101 Firefox/4.0.1"
120.151.29.128 - - \[08/Aug/2019:04:23:16 +0000\] "POST /xmlrpc.php HTTP/1.1" 301 603 "-" "Mozilla/5.0 \(X11\; Linux i686\; rv:2.0.1\) Gecko/20100101 Firefox/4.0.1"
120.151.29.128 - - \[08/Aug/2019:04:24:16 +0000\] "POST /xmlrpc.php HTTP/1.1" 301 603 "-" "Mozilla/5.0 \(X11\; Linux i686\; rv:2.0.1\) Gecko/20100101 Firefox/4.0.1"
2019-08-08 12:52:58
218.92.0.194 attackspambots
Aug  8 06:57:24 eventyay sshd[2801]: Failed password for root from 218.92.0.194 port 13473 ssh2
Aug  8 06:57:59 eventyay sshd[2814]: Failed password for root from 218.92.0.194 port 24303 ssh2
Aug  8 06:58:01 eventyay sshd[2814]: Failed password for root from 218.92.0.194 port 24303 ssh2
...
2019-08-08 13:17:51
218.92.0.191 attack
2019-08-08T04:33:02.187220abusebot-8.cloudsearch.cf sshd\[12652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
2019-08-08 12:47:37
183.109.79.252 attackspambots
Aug  8 01:05:24 ny01 sshd[14243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.79.252
Aug  8 01:05:26 ny01 sshd[14243]: Failed password for invalid user fluentd from 183.109.79.252 port 20438 ssh2
Aug  8 01:10:42 ny01 sshd[14646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.79.252
2019-08-08 13:21:00

Recently Reported IPs

104.22.1.70 104.22.1.75 104.22.1.72 104.22.1.78
104.22.1.79 104.22.1.83 104.22.1.85 104.22.1.8
104.22.1.90 104.22.1.92 104.22.1.94 104.22.1.95
104.22.10.111 104.22.10.108 104.22.10.118 104.22.10.131
104.22.10.121 104.22.10.124 104.22.10.132 104.22.10.135