Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.12.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37459
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.12.72.			IN	A

;; AUTHORITY SECTION:
.			395	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040600 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 06 23:50:19 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 72.12.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 72.12.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.96.63.162 attack
Jun  1 15:17:41 server1 sshd\[21779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.63.162  user=root
Jun  1 15:17:43 server1 sshd\[21779\]: Failed password for root from 180.96.63.162 port 33287 ssh2
Jun  1 15:20:50 server1 sshd\[22702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.63.162  user=root
Jun  1 15:20:52 server1 sshd\[22702\]: Failed password for root from 180.96.63.162 port 59056 ssh2
Jun  1 15:24:05 server1 sshd\[23756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.63.162  user=root
...
2020-06-02 05:37:31
218.92.0.168 attack
Jun  1 23:43:14 [host] sshd[18247]: pam_unix(sshd:
Jun  1 23:43:16 [host] sshd[18247]: Failed passwor
Jun  1 23:43:19 [host] sshd[18247]: Failed passwor
2020-06-02 05:53:51
112.30.128.101 attackbotsspam
Jun  1 17:16:54 firewall sshd[16169]: Failed password for root from 112.30.128.101 port 56118 ssh2
Jun  1 17:19:14 firewall sshd[16256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.128.101  user=root
Jun  1 17:19:16 firewall sshd[16256]: Failed password for root from 112.30.128.101 port 57752 ssh2
...
2020-06-02 05:39:11
213.158.10.101 attack
Jun  1 23:19:57 pve1 sshd[25333]: Failed password for root from 213.158.10.101 port 36928 ssh2
...
2020-06-02 05:55:07
176.165.57.30 attackbots
5x Failed Password
2020-06-02 05:29:07
209.17.97.122 attack
 UDP 209.17.97.122:61727 -> port 137, len 78
2020-06-02 05:36:49
206.81.10.104 attackbots
Jun  1 17:30:59 NPSTNNYC01T sshd[18335]: Failed password for root from 206.81.10.104 port 34778 ssh2
Jun  1 17:34:43 NPSTNNYC01T sshd[18571]: Failed password for root from 206.81.10.104 port 39864 ssh2
...
2020-06-02 05:48:55
62.210.215.25 attackspambots
Jun  1 22:18:56 ns3164893 sshd[10412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.215.25  user=root
Jun  1 22:18:58 ns3164893 sshd[10412]: Failed password for root from 62.210.215.25 port 47786 ssh2
...
2020-06-02 05:57:36
187.178.22.206 attackspam
Automatic report - Port Scan Attack
2020-06-02 05:20:32
122.51.183.135 attackbots
2020-06-01T22:09:49.040142vps751288.ovh.net sshd\[9030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.183.135  user=root
2020-06-01T22:09:51.266402vps751288.ovh.net sshd\[9030\]: Failed password for root from 122.51.183.135 port 44660 ssh2
2020-06-01T22:14:40.107010vps751288.ovh.net sshd\[9066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.183.135  user=root
2020-06-01T22:14:41.947225vps751288.ovh.net sshd\[9066\]: Failed password for root from 122.51.183.135 port 38910 ssh2
2020-06-01T22:19:26.062643vps751288.ovh.net sshd\[9094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.183.135  user=root
2020-06-02 05:32:08
95.110.129.91 attack
95.110.129.91 - - [01/Jun/2020:22:59:42 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
95.110.129.91 - - [01/Jun/2020:23:20:19 +0200] "POST /xmlrpc.php HTTP/1.1" 403 31 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-02 06:00:55
152.89.162.194 attackbots
DDoS Attack on Teamspeak 3
2020-06-02 05:25:32
167.99.155.36 attack
Jun  1 23:07:39  sshd\[11952\]: User root from www2.bwell.solutions not allowed because not listed in AllowUsersJun  1 23:07:41  sshd\[11952\]: Failed password for invalid user root from 167.99.155.36 port 59236 ssh2
...
2020-06-02 05:27:44
107.175.83.198 attackspam
5x Failed Password
2020-06-02 05:56:48
51.77.149.232 attackspam
Jun  1 15:41:11 server1 sshd\[29332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.149.232  user=root
Jun  1 15:41:13 server1 sshd\[29332\]: Failed password for root from 51.77.149.232 port 38498 ssh2
Jun  1 15:44:42 server1 sshd\[30910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.149.232  user=root
Jun  1 15:44:45 server1 sshd\[30910\]: Failed password for root from 51.77.149.232 port 43184 ssh2
Jun  1 15:48:14 server1 sshd\[32082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.149.232  user=root
...
2020-06-02 05:52:14

Recently Reported IPs

104.22.12.250 104.22.13.250 104.22.13.72 104.22.14.110
104.22.14.218 104.22.14.52 104.22.14.55 104.22.14.77
104.22.15.110 104.22.15.218 104.22.15.52 104.22.15.77
104.22.16.124 104.22.16.145 104.22.16.85 104.22.17.124
104.22.17.85 104.22.18.149 104.22.18.183 104.22.18.86