Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.12.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.12.41.			IN	A

;; AUTHORITY SECTION:
.			331	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:23:15 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 41.12.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.12.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
168.121.51.42 attackbotsspam
Unauthorized connection attempt detected from IP address 168.121.51.42 to port 445
2019-12-09 13:05:16
177.124.216.10 attackbotsspam
Dec  9 05:13:32 Ubuntu-1404-trusty-64-minimal sshd\[24329\]: Invalid user rahima from 177.124.216.10
Dec  9 05:13:32 Ubuntu-1404-trusty-64-minimal sshd\[24329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.216.10
Dec  9 05:13:34 Ubuntu-1404-trusty-64-minimal sshd\[24329\]: Failed password for invalid user rahima from 177.124.216.10 port 43279 ssh2
Dec  9 05:56:43 Ubuntu-1404-trusty-64-minimal sshd\[14627\]: Invalid user desbos from 177.124.216.10
Dec  9 05:56:43 Ubuntu-1404-trusty-64-minimal sshd\[14627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.216.10
2019-12-09 13:21:24
103.40.235.233 attackspam
Dec  9 05:56:39 icinga sshd[5386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.40.235.233
Dec  9 05:56:42 icinga sshd[5386]: Failed password for invalid user bbbbbbb from 103.40.235.233 port 59616 ssh2
...
2019-12-09 13:23:51
188.166.115.226 attackspambots
Dec  9 05:51:32 OPSO sshd\[16618\]: Invalid user adhy from 188.166.115.226 port 43726
Dec  9 05:51:32 OPSO sshd\[16618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.115.226
Dec  9 05:51:33 OPSO sshd\[16618\]: Failed password for invalid user adhy from 188.166.115.226 port 43726 ssh2
Dec  9 05:56:52 OPSO sshd\[18253\]: Invalid user shoo from 188.166.115.226 port 52150
Dec  9 05:56:52 OPSO sshd\[18253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.115.226
2019-12-09 13:11:27
118.187.5.37 attack
Dec  9 05:56:42 v22018076622670303 sshd\[22512\]: Invalid user daschle from 118.187.5.37 port 60722
Dec  9 05:56:42 v22018076622670303 sshd\[22512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.187.5.37
Dec  9 05:56:44 v22018076622670303 sshd\[22512\]: Failed password for invalid user daschle from 118.187.5.37 port 60722 ssh2
...
2019-12-09 13:19:08
103.44.27.58 attack
Dec  9 06:50:10 pkdns2 sshd\[30152\]: Address 103.44.27.58 maps to araindonesia.tk, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Dec  9 06:50:10 pkdns2 sshd\[30152\]: Invalid user mecmec from 103.44.27.58Dec  9 06:50:12 pkdns2 sshd\[30152\]: Failed password for invalid user mecmec from 103.44.27.58 port 41783 ssh2Dec  9 06:56:55 pkdns2 sshd\[30545\]: Address 103.44.27.58 maps to araindonesia.tk, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Dec  9 06:56:55 pkdns2 sshd\[30545\]: Invalid user rollyn from 103.44.27.58Dec  9 06:56:57 pkdns2 sshd\[30545\]: Failed password for invalid user rollyn from 103.44.27.58 port 46356 ssh2
...
2019-12-09 13:05:53
14.37.38.213 attackbotsspam
Dec  9 05:09:22 web8 sshd\[6496\]: Invalid user nygren from 14.37.38.213
Dec  9 05:09:22 web8 sshd\[6496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.37.38.213
Dec  9 05:09:25 web8 sshd\[6496\]: Failed password for invalid user nygren from 14.37.38.213 port 44908 ssh2
Dec  9 05:15:51 web8 sshd\[9548\]: Invalid user marketing from 14.37.38.213
Dec  9 05:15:51 web8 sshd\[9548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.37.38.213
2019-12-09 13:31:41
196.52.84.43 attack
Brute froce
2019-12-09 13:22:17
51.38.57.78 attackbots
Dec  9 00:15:47 ny01 sshd[29875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78
Dec  9 00:15:49 ny01 sshd[29875]: Failed password for invalid user server from 51.38.57.78 port 58334 ssh2
Dec  9 00:20:38 ny01 sshd[30434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78
2019-12-09 13:28:14
182.61.104.247 attackspambots
Dec  9 05:08:17 hcbbdb sshd\[16919\]: Invalid user vol from 182.61.104.247
Dec  9 05:08:17 hcbbdb sshd\[16919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.104.247
Dec  9 05:08:19 hcbbdb sshd\[16919\]: Failed password for invalid user vol from 182.61.104.247 port 48305 ssh2
Dec  9 05:14:17 hcbbdb sshd\[17650\]: Invalid user ab from 182.61.104.247
Dec  9 05:14:17 hcbbdb sshd\[17650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.104.247
2019-12-09 13:22:32
104.225.223.31 attackbotsspam
Dec  9 04:55:05 web8 sshd\[31605\]: Invalid user britto from 104.225.223.31
Dec  9 04:55:05 web8 sshd\[31605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.225.223.31
Dec  9 04:55:07 web8 sshd\[31605\]: Failed password for invalid user britto from 104.225.223.31 port 53194 ssh2
Dec  9 05:01:06 web8 sshd\[2348\]: Invalid user follis from 104.225.223.31
Dec  9 05:01:06 web8 sshd\[2348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.225.223.31
2019-12-09 13:14:46
45.82.153.140 attackspambots
2019-12-09T05:30:09.703759talon auth[2071822]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=admin@catram.org rhost=45.82.153.140
2019-12-09T05:30:33.891460talon auth[2071822]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=admin@catram.org rhost=45.82.153.140
2019-12-09T05:30:49.362468talon auth[2071822]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=admin@catram.org rhost=45.82.153.140
2019-12-09 13:31:11
115.159.149.136 attackbotsspam
2019-12-09T01:52:43.257617static.108.197.76.144.clients.your-server.de sshd[15893]: Invalid user ipshostnamea from 115.159.149.136
2019-12-09T01:52:43.260064static.108.197.76.144.clients.your-server.de sshd[15893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.149.136
2019-12-09T01:52:45.511399static.108.197.76.144.clients.your-server.de sshd[15893]: Failed password for invalid user ipshostnamea from 115.159.149.136 port 39634 ssh2
2019-12-09T02:00:32.933772static.108.197.76.144.clients.your-server.de sshd[17043]: Invalid user rosemarie from 115.159.149.136
2019-12-09T02:00:32.936161static.108.197.76.144.clients.your-server.de sshd[17043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.149.136

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=115.159.149.136
2019-12-09 09:24:50
106.12.34.56 attackspam
2019-12-09T04:57:01.548954abusebot-7.cloudsearch.cf sshd\[21346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.56  user=root
2019-12-09 13:01:56
218.92.0.135 attack
Dec  9 00:13:57 mail sshd\[46373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135  user=root
...
2019-12-09 13:21:00

Recently Reported IPs

104.22.12.21 104.22.12.205 104.22.12.50 13.226.237.89
104.22.12.197 104.22.13.165 104.22.13.148 104.22.13.149
104.22.13.200 104.22.13.201 104.22.12.82 104.22.13.21
104.22.13.197 104.22.13.209 104.22.13.41 13.226.237.93
104.22.14.133 104.22.13.82 104.22.13.50 104.22.14.104