Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.10.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60789
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.10.99.			IN	A

;; AUTHORITY SECTION:
.			592	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030300 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 01:42:51 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 99.10.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.10.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.246.76.244 attackbotsspam
Dec 31 06:18:15 debian-2gb-nbg1-2 kernel: \[28830.434542\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.246.76.244 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=48117 PROTO=TCP SPT=50164 DPT=24200 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-31 13:30:31
112.85.42.172 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Failed password for root from 112.85.42.172 port 4437 ssh2
Failed password for root from 112.85.42.172 port 4437 ssh2
Failed password for root from 112.85.42.172 port 4437 ssh2
Failed password for root from 112.85.42.172 port 4437 ssh2
2019-12-31 13:41:53
173.244.217.66 attackbotsspam
Childish Website Spammer IDIOT~
2019-12-31 13:28:24
86.207.185.55 attackbotsspam
Dec 31 05:56:37 icecube sshd[74278]: Failed password for root from 86.207.185.55 port 47452 ssh2
2019-12-31 13:26:34
222.186.175.155 attack
Dec 31 06:17:26 * sshd[17605]: Failed password for root from 222.186.175.155 port 23080 ssh2
Dec 31 06:17:39 * sshd[17605]: error: maximum authentication attempts exceeded for root from 222.186.175.155 port 23080 ssh2 [preauth]
2019-12-31 13:26:01
66.70.188.152 attackspam
Dec 31 06:20:02 MK-Soft-VM8 sshd[24368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.188.152 
Dec 31 06:20:02 MK-Soft-VM8 sshd[24372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.188.152 
Dec 31 06:20:02 MK-Soft-VM8 sshd[24373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.188.152 
Dec 31 06:20:02 MK-Soft-VM8 sshd[24370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.188.152 
Dec 31 06:20:02 MK-Soft-VM8 sshd[24375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.188.152 
Dec 31 06:20:02 MK-Soft-VM8 sshd[24374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.188.152 
Dec 31 06:20:02 MK-Soft-VM8 sshd[24384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.188.152 
Dec 31 06:20:02
2019-12-31 13:23:38
51.75.17.6 attackspam
Dec 31 05:56:53 ns381471 sshd[27539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.6
Dec 31 05:56:55 ns381471 sshd[27539]: Failed password for invalid user barner from 51.75.17.6 port 52082 ssh2
2019-12-31 13:16:31
115.236.168.35 attack
Dec 31 05:53:13 localhost sshd\[17340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.168.35  user=root
Dec 31 05:53:16 localhost sshd\[17340\]: Failed password for root from 115.236.168.35 port 57222 ssh2
Dec 31 05:56:14 localhost sshd\[17613\]: Invalid user levans from 115.236.168.35 port 54164
2019-12-31 13:41:27
221.178.157.244 attackspam
Dec 31 05:56:44 localhost sshd\[17654\]: Invalid user acree from 221.178.157.244 port 57985
Dec 31 05:56:44 localhost sshd\[17654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.178.157.244
Dec 31 05:56:46 localhost sshd\[17654\]: Failed password for invalid user acree from 221.178.157.244 port 57985 ssh2
2019-12-31 13:21:20
68.183.48.172 attack
Dec 31 05:54:19 vps691689 sshd[8878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172
Dec 31 05:54:21 vps691689 sshd[8878]: Failed password for invalid user chunlan from 68.183.48.172 port 38780 ssh2
Dec 31 05:56:14 vps691689 sshd[8895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172
...
2019-12-31 13:42:22
103.79.141.168 attackspambots
Unauthorized connection attempt detected from IP address 103.79.141.168 to port 5900
2019-12-31 13:12:21
77.73.95.88 attackspam
[portscan] Port scan
2019-12-31 13:36:21
218.92.0.171 attackbots
--- report ---
Dec 31 02:18:41 -0300 sshd: Connection from 218.92.0.171 port 47215
Dec 31 02:18:45 -0300 sshd: Failed password for root from 218.92.0.171 port 47215 ssh2
Dec 31 02:18:47 -0300 sshd: Received disconnect from 218.92.0.171: 11:  [preauth]
2019-12-31 13:26:17
51.79.121.113 attackbots
\[2019-12-31 05:54:55\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-31T05:54:55.012+0100",Severity="Error",Service="SIP",EventVersion="2",AccountID="000972592879157",SessionID="0x7f241892c858",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/51.79.121.113/63655",Challenge="3f0fe78b",ReceivedChallenge="3f0fe78b",ReceivedHash="748ab1d4adaa67a116eac3bf9a43639e"
\[2019-12-31 05:54:55\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-31T05:54:55.273+0100",Severity="Error",Service="SIP",EventVersion="2",AccountID="000972592879157",SessionID="0x7f2418af6f08",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/51.79.121.113/63822",Challenge="543c5039",ReceivedChallenge="543c5039",ReceivedHash="5d2f8a97230b7c3b6c458eaf9d3b81b0"
\[2019-12-31 05:55:16\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-31T05:55:16.244+0100",Severity="Error",Service="SI
...
2019-12-31 13:40:41
144.91.80.182 attackspam
Blocked for recurring port scan.
Time: Tue Dec 31. 05:42:39 2019 +0100
IP: 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net)

Temporary blocks that triggered the permanent block:
Tue Dec 31 01:41:24 2019 *Port Scan* detected from 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net). 11 hits in the last 70 seconds
Tue Dec 31 02:41:43 2019 *Port Scan* detected from 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net). 11 hits in the last 80 seconds
Tue Dec 31 03:41:59 2019 *Port Scan* detected from 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net). 11 hits in the last 85 seconds
Tue Dec 31 04:42:18 2019 *Port Scan* detected from 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net). 11 hits in the last 95 seconds
Tue Dec 31 05:42:37 2019 *Port Scan* detected from 144.91.80.182 (DE/Germany/vmi318783.contaboserver.net). 11 hits in the last 105 seconds
2019-12-31 13:20:08

Recently Reported IPs

141.98.19.110 104.22.11.172 104.22.11.99 254.138.121.254
104.22.14.134 104.22.14.145 104.22.14.245 104.22.14.54
104.22.15.134 104.22.15.145 104.22.15.245 104.22.16.139
104.22.16.140 104.22.16.236 104.22.17.140 104.22.17.236
104.22.18.105 104.22.18.121 104.22.18.177 104.22.18.230