Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.14.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.14.68.			IN	A

;; AUTHORITY SECTION:
.			585	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:25:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 68.14.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.14.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.94.188.195 attackspambots
Nov 20 06:18:03 localhost sshd\[106826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.94.188.195  user=root
Nov 20 06:18:06 localhost sshd\[106826\]: Failed password for root from 185.94.188.195 port 47966 ssh2
Nov 20 06:23:57 localhost sshd\[106963\]: Invalid user account from 185.94.188.195 port 38563
Nov 20 06:23:57 localhost sshd\[106963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.94.188.195
Nov 20 06:23:59 localhost sshd\[106963\]: Failed password for invalid user account from 185.94.188.195 port 38563 ssh2
...
2019-11-20 14:24:14
129.211.10.228 attack
Nov 20 08:32:15 sauna sshd[111074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.10.228
Nov 20 08:32:17 sauna sshd[111074]: Failed password for invalid user custer from 129.211.10.228 port 57352 ssh2
...
2019-11-20 14:46:50
62.234.156.221 attackspam
Invalid user installer from 62.234.156.221 port 39262
2019-11-20 14:15:11
41.182.147.1 attackbots
Automatic report - Port Scan Attack
2019-11-20 14:12:34
54.37.155.165 attack
Nov 20 07:44:36 sauna sshd[110413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.155.165
Nov 20 07:44:37 sauna sshd[110413]: Failed password for invalid user par0t from 54.37.155.165 port 60406 ssh2
...
2019-11-20 14:00:49
46.200.157.213 attack
" "
2019-11-20 14:09:27
62.234.146.45 attackbotsspam
Nov 19 22:54:22 dallas01 sshd[12623]: Failed password for bin from 62.234.146.45 port 36424 ssh2
Nov 19 22:59:16 dallas01 sshd[13500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45
Nov 19 22:59:18 dallas01 sshd[13500]: Failed password for invalid user e from 62.234.146.45 port 38258 ssh2
2019-11-20 14:22:23
149.129.236.66 attackspam
Invalid user qx from 149.129.236.66 port 39544
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.236.66
Failed password for invalid user qx from 149.129.236.66 port 39544 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.236.66  user=root
Failed password for root from 149.129.236.66 port 42360 ssh2
2019-11-20 14:01:47
218.27.204.33 attack
2019-11-20 05:56:00,341 fail2ban.actions: WARNING [ssh] Ban 218.27.204.33
2019-11-20 14:06:08
201.77.127.49 attackbots
RDP Brute-Force (Grieskirchen RZ2)
2019-11-20 14:20:22
103.28.53.146 attackspam
LGS,WP GET /wp-login.php
2019-11-20 14:28:17
106.75.173.67 attack
Nov 20 07:26:26 dedicated sshd[2257]: Failed password for root from 106.75.173.67 port 56780 ssh2
Nov 20 07:30:42 dedicated sshd[2911]: Invalid user monitor from 106.75.173.67 port 34964
Nov 20 07:30:42 dedicated sshd[2911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.173.67 
Nov 20 07:30:42 dedicated sshd[2911]: Invalid user monitor from 106.75.173.67 port 34964
Nov 20 07:30:44 dedicated sshd[2911]: Failed password for invalid user monitor from 106.75.173.67 port 34964 ssh2
2019-11-20 14:47:35
222.186.175.220 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
Failed password for root from 222.186.175.220 port 52022 ssh2
Failed password for root from 222.186.175.220 port 52022 ssh2
Failed password for root from 222.186.175.220 port 52022 ssh2
Failed password for root from 222.186.175.220 port 52022 ssh2
2019-11-20 14:46:26
93.171.141.141 attack
Nov 19 19:53:04 php1 sshd\[25505\]: Invalid user hambleton from 93.171.141.141
Nov 19 19:53:04 php1 sshd\[25505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.171.141.141
Nov 19 19:53:06 php1 sshd\[25505\]: Failed password for invalid user hambleton from 93.171.141.141 port 36310 ssh2
Nov 19 19:56:55 php1 sshd\[25821\]: Invalid user squid from 93.171.141.141
Nov 19 19:56:55 php1 sshd\[25821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.171.141.141
2019-11-20 14:08:05
95.136.10.65 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/95.136.10.65/ 
 
 PT - 1H : (13)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PT 
 NAME ASN : ASN12353 
 
 IP : 95.136.10.65 
 
 CIDR : 95.136.0.0/17 
 
 PREFIX COUNT : 32 
 
 UNIQUE IP COUNT : 1208064 
 
 
 ATTACKS DETECTED ASN12353 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 3 
 
 DateTime : 2019-11-20 05:55:02 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-20 14:29:45

Recently Reported IPs

104.22.14.75 104.22.14.76 104.22.14.86 104.22.14.90
104.22.14.87 104.22.14.83 104.22.14.99 104.22.14.92
104.22.15.121 104.22.15.126 104.22.14.93 104.22.15.118
104.22.15.113 104.22.15.127 104.22.15.137 104.22.15.138
104.22.15.150 104.22.15.14 104.22.15.156 104.22.15.153