Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.19.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29594
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.19.136.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:26:58 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 136.19.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.19.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.127.86.135 attackbots
Oct  7 00:58:52 vpn01 sshd[1709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.86.135
Oct  7 00:58:54 vpn01 sshd[1709]: Failed password for invalid user Chain@123 from 222.127.86.135 port 32896 ssh2
...
2019-10-07 07:50:59
51.15.46.184 attackbotsspam
Oct  7 05:47:20 ns381471 sshd[13095]: Failed password for root from 51.15.46.184 port 51860 ssh2
Oct  7 05:51:17 ns381471 sshd[13207]: Failed password for root from 51.15.46.184 port 35484 ssh2
2019-10-07 12:01:31
180.76.246.38 attackbots
Oct  6 18:37:47 TORMINT sshd\[855\]: Invalid user PASSW0RD123!@\# from 180.76.246.38
Oct  6 18:37:47 TORMINT sshd\[855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.38
Oct  6 18:37:50 TORMINT sshd\[855\]: Failed password for invalid user PASSW0RD123!@\# from 180.76.246.38 port 39500 ssh2
...
2019-10-07 07:39:20
49.88.112.78 attackbotsspam
2019-10-07T04:06:36.576322abusebot.cloudsearch.cf sshd\[412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.78  user=root
2019-10-07 12:12:46
163.172.127.64 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-07 12:02:32
218.92.0.173 attackspam
Oct  6 15:47:00 123flo sshd[50734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Oct  6 15:47:02 123flo sshd[50734]: Failed password for root from 218.92.0.173 port 5852 ssh2
2019-10-07 07:49:18
192.99.244.145 attackspambots
2019-10-06T23:46:16.606916abusebot-5.cloudsearch.cf sshd\[16724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.ip-192-99-244.net  user=root
2019-10-07 07:56:14
119.29.195.107 attack
Oct  7 01:35:29 vps647732 sshd[23334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.195.107
Oct  7 01:35:31 vps647732 sshd[23334]: Failed password for invalid user Directeur2017 from 119.29.195.107 port 51020 ssh2
...
2019-10-07 07:43:33
129.226.129.191 attackbots
Oct  6 13:38:26 web9 sshd\[31765\]: Invalid user Toulouse2016 from 129.226.129.191
Oct  6 13:38:26 web9 sshd\[31765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.191
Oct  6 13:38:28 web9 sshd\[31765\]: Failed password for invalid user Toulouse2016 from 129.226.129.191 port 52900 ssh2
Oct  6 13:43:09 web9 sshd\[32518\]: Invalid user Hospital-123 from 129.226.129.191
Oct  6 13:43:09 web9 sshd\[32518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.191
2019-10-07 07:44:51
132.232.40.45 attackspambots
Oct  7 05:06:58 areeb-Workstation sshd[1422]: Failed password for root from 132.232.40.45 port 43508 ssh2
...
2019-10-07 07:43:50
153.127.194.223 attackbots
SSH/22 MH Probe, BF, Hack -
2019-10-07 07:48:35
45.80.65.82 attackspam
Oct  7 06:50:54 site3 sshd\[77921\]: Invalid user Porn123 from 45.80.65.82
Oct  7 06:50:54 site3 sshd\[77921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82
Oct  7 06:50:56 site3 sshd\[77921\]: Failed password for invalid user Porn123 from 45.80.65.82 port 53882 ssh2
Oct  7 06:54:45 site3 sshd\[78033\]: Invalid user DEBIAN@1234 from 45.80.65.82
Oct  7 06:54:45 site3 sshd\[78033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82
...
2019-10-07 12:10:04
103.249.52.5 attack
Oct  7 03:49:51 game-panel sshd[20216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.249.52.5
Oct  7 03:49:54 game-panel sshd[20216]: Failed password for invalid user Coco@2017 from 103.249.52.5 port 59740 ssh2
Oct  7 03:54:46 game-panel sshd[20359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.249.52.5
2019-10-07 12:12:14
80.211.159.118 attackbots
*Port Scan* detected from 80.211.159.118 (IT/Italy/host118-159-211-80.serverdedicati.aruba.it). 4 hits in the last 80 seconds
2019-10-07 12:02:46
88.88.193.230 attackbots
Oct  6 23:52:01 legacy sshd[28788]: Failed password for root from 88.88.193.230 port 40042 ssh2
Oct  6 23:56:06 legacy sshd[28876]: Failed password for root from 88.88.193.230 port 60310 ssh2
...
2019-10-07 07:59:22

Recently Reported IPs

104.22.19.123 104.22.19.144 104.22.19.139 104.22.19.140
104.22.19.146 104.22.19.148 104.22.19.150 104.22.19.167
104.22.19.151 104.22.19.174 104.22.19.158 104.22.19.166
104.22.19.165 104.22.19.176 104.22.19.189 104.22.19.193
104.22.19.178 104.22.19.201 104.22.19.199 104.22.19.203