Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.12.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.12.136.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022101 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 01:46:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 136.12.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.12.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.125.223.23 attackspambots
Feb 22 20:04:14 motanud sshd\[7091\]: Invalid user ftpuser from 88.125.223.23 port 37441
Feb 22 20:04:14 motanud sshd\[7091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.125.223.23
Feb 22 20:04:16 motanud sshd\[7091\]: Failed password for invalid user ftpuser from 88.125.223.23 port 37441 ssh2
2019-07-03 10:30:50
88.12.102.63 attack
Feb 24 17:13:01 motanud sshd\[26875\]: Invalid user user from 88.12.102.63 port 60204
Feb 24 17:13:01 motanud sshd\[26875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.12.102.63
Feb 24 17:13:03 motanud sshd\[26875\]: Failed password for invalid user user from 88.12.102.63 port 60204 ssh2
2019-07-03 10:31:24
121.150.84.210 attackspam
DATE:2019-07-03_01:14:44, IP:121.150.84.210, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-03 09:56:37
80.15.144.222 attack
80.15.144.222 - - \[03/Jul/2019:01:14:28 +0200\] "POST /contact-form.php HTTP/1.1" 404 49228 "-" "-"
2019-07-03 10:06:34
180.218.92.160 attackspam
400 BAD REQUEST
2019-07-03 09:49:52
177.8.244.38 attackspam
Jul  2 23:15:35 toyboy sshd[4446]: Invalid user deploy from 177.8.244.38
Jul  2 23:15:35 toyboy sshd[4446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.8.244.38
Jul  2 23:15:38 toyboy sshd[4446]: Failed password for invalid user deploy from 177.8.244.38 port 39072 ssh2
Jul  2 23:15:38 toyboy sshd[4446]: Received disconnect from 177.8.244.38: 11: Bye Bye [preauth]
Jul  2 23:19:24 toyboy sshd[4811]: Invalid user tunnel from 177.8.244.38
Jul  2 23:19:24 toyboy sshd[4811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.8.244.38
Jul  2 23:19:25 toyboy sshd[4811]: Failed password for invalid user tunnel from 177.8.244.38 port 55791 ssh2
Jul  2 23:19:26 toyboy sshd[4811]: Received disconnect from 177.8.244.38: 11: Bye Bye [preauth]
Jul  2 23:22:10 toyboy sshd[5100]: Invalid user zhouh from 177.8.244.38
Jul  2 23:22:10 toyboy sshd[5100]: pam_unix(sshd:auth): authentication failure; logn........
-------------------------------
2019-07-03 10:22:12
5.196.75.178 attack
Jul  3 03:10:08 vps647732 sshd[594]: Failed password for www-data from 5.196.75.178 port 33856 ssh2
...
2019-07-03 10:15:05
188.81.156.121 attack
Trying to deliver email spam, but blocked by RBL
2019-07-03 10:03:13
123.201.158.194 attack
Jul  2 23:32:07 localhost sshd\[7679\]: Invalid user webadmin from 123.201.158.194 port 55540
Jul  2 23:32:07 localhost sshd\[7679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.158.194
Jul  2 23:32:10 localhost sshd\[7679\]: Failed password for invalid user webadmin from 123.201.158.194 port 55540 ssh2
Jul  2 23:34:41 localhost sshd\[7759\]: Invalid user user8 from 123.201.158.194 port 39870
Jul  2 23:34:41 localhost sshd\[7759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.158.194
...
2019-07-03 10:28:58
66.97.41.148 attackbotsspam
proto=tcp  .  spt=56650  .  dpt=25  .     (listed on Blocklist de  Jul 02)     (37)
2019-07-03 09:59:41
185.14.148.66 attack
proto=tcp  .  spt=36306  .  dpt=25  .     (listed on Blocklist de  Jul 02)     (19)
2019-07-03 10:31:42
153.36.236.35 attack
2019-07-03T01:15:12.095896Z 111d5aaa9e71 New connection: 153.36.236.35:40672 (172.17.0.4:2222) [session: 111d5aaa9e71]
2019-07-03T01:46:15.882132Z ad8c481f24f4 New connection: 153.36.236.35:30548 (172.17.0.4:2222) [session: ad8c481f24f4]
2019-07-03 10:07:31
177.223.103.210 attack
39,54-10/02 concatform PostRequest-Spammer scoring: Durban01
2019-07-03 09:47:21
125.64.94.220 attackbots
03.07.2019 01:48:12 Connection to port 32807 blocked by firewall
2019-07-03 10:12:12
43.231.115.88 attack
proto=tcp  .  spt=37124  .  dpt=25  .     (listed on Blocklist de  Jul 02)     (21)
2019-07-03 10:28:33

Recently Reported IPs

104.22.11.49 104.22.12.47 104.22.13.136 104.22.13.47
104.22.14.102 104.22.14.238 104.22.14.60 104.22.14.64
104.22.15.102 213.158.4.59 104.22.15.163 104.22.15.238
104.22.15.60 104.22.15.64 104.22.16.163 104.22.16.235
104.22.17.163 104.22.26.231 104.22.27.231 104.22.28.189