Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.12.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.12.47.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022101 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 01:46:19 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 47.12.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 47.12.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
176.32.39.161 attackspambots
Brute force attack against VPN service
2020-02-22 07:10:33
185.117.149.63 spam
scam, spoofing
2020-02-22 07:13:36
82.125.211.136 attack
Invalid user ruby from 82.125.211.136 port 34208
2020-02-22 07:13:34
103.131.71.193 attackspam
Visited directories available only to apple and android users in the United State and Mexico... via app store...
Not sure what they are doing looking at my customer support and privacy policy for... except data mining email addresses and phone numbers....
2020-02-22 07:34:32
138.118.123.138 attackspam
" "
2020-02-22 07:05:47
223.104.16.190 attackspambots
MVPower DVR TV Shell Unauthenticated Command Execution Vulnerability
2020-02-22 07:20:16
209.17.96.122 attack
8888/tcp 5000/tcp 8088/tcp...
[2019-12-24/2020-02-21]46pkt,12pt.(tcp),1pt.(udp)
2020-02-22 07:23:38
223.197.125.10 attack
Invalid user vsftpd from 223.197.125.10 port 59854
2020-02-22 07:24:43
222.186.175.182 attackbotsspam
Feb 21 23:30:10 game-panel sshd[32712]: Failed password for root from 222.186.175.182 port 29020 ssh2
Feb 21 23:30:13 game-panel sshd[32712]: Failed password for root from 222.186.175.182 port 29020 ssh2
Feb 21 23:30:22 game-panel sshd[32712]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 29020 ssh2 [preauth]
2020-02-22 07:31:52
106.13.146.93 attack
Feb 21 22:10:42 Invalid user adi from 106.13.146.93 port 50392
2020-02-22 07:36:23
186.121.254.82 attack
Unauthorized connection attempt from IP address 186.121.254.82 on Port 445(SMB)
2020-02-22 07:32:05
59.127.99.163 attackspam
firewall-block, port(s): 23/tcp
2020-02-22 07:33:12
218.92.0.175 attackbotsspam
Feb 22 03:59:19 gw1 sshd[2218]: Failed password for root from 218.92.0.175 port 36008 ssh2
Feb 22 03:59:29 gw1 sshd[2218]: Failed password for root from 218.92.0.175 port 36008 ssh2
...
2020-02-22 07:08:07
83.103.215.25 attackbots
IP: 83.103.215.25
Ports affected
    Simple Mail Transfer (25) 
Found in DNSBL('s)
ASN Details
   AS6830 Liberty Global B.V.
   Romania (RO)
   CIDR 83.103.128.0/17
Log Date: 21/02/2020 8:12:34 PM UTC
2020-02-22 07:14:59
187.189.40.41 attackspam
Unauthorized connection attempt from IP address 187.189.40.41 on Port 445(SMB)
2020-02-22 07:28:07

Recently Reported IPs

104.22.12.136 104.22.13.136 104.22.13.47 104.22.14.102
104.22.14.238 104.22.14.60 104.22.14.64 104.22.15.102
213.158.4.59 104.22.15.163 104.22.15.238 104.22.15.60
104.22.15.64 104.22.16.163 104.22.16.235 104.22.17.163
104.22.26.231 104.22.27.231 104.22.28.189 104.22.28.75