Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.2.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.2.146.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:27:17 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 146.2.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 146.2.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.214.241.18 attack
Nov  9 01:21:16 vps647732 sshd[8264]: Failed password for root from 1.214.241.18 port 60700 ssh2
Nov  9 01:25:48 vps647732 sshd[8313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.214.241.18
...
2019-11-09 08:35:14
120.71.181.214 attack
k+ssh-bruteforce
2019-11-09 08:07:46
94.23.25.77 attackspam
Nov  8 19:41:25 ws24vmsma01 sshd[237582]: Failed password for root from 94.23.25.77 port 34582 ssh2
Nov  8 19:49:22 ws24vmsma01 sshd[244335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.25.77
...
2019-11-09 08:29:57
46.191.137.89 attackbots
Triggered by Fail2Ban at Vostok web server
2019-11-09 08:31:00
5.196.217.177 attackspam
Nov  8 23:47:27  postfix/smtpd: warning: unknown[5.196.217.177]: SASL LOGIN authentication failed
2019-11-09 08:04:14
159.89.111.136 attack
Nov  8 17:34:47 lanister sshd[1513]: Invalid user spark from 159.89.111.136
Nov  8 17:34:47 lanister sshd[1513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
Nov  8 17:34:47 lanister sshd[1513]: Invalid user spark from 159.89.111.136
Nov  8 17:34:49 lanister sshd[1513]: Failed password for invalid user spark from 159.89.111.136 port 35592 ssh2
...
2019-11-09 08:04:47
222.186.175.150 attack
Nov  9 01:11:00 srv1 sshd[16407]: Failed password for root from 222.186.175.150 port 16460 ssh2
Nov  9 01:11:04 srv1 sshd[16407]: Failed password for root from 222.186.175.150 port 16460 ssh2
...
2019-11-09 08:19:00
182.52.134.179 attackbots
Nov  9 00:40:53 vps691689 sshd[21041]: Failed password for root from 182.52.134.179 port 42070 ssh2
Nov  9 00:45:14 vps691689 sshd[21742]: Failed password for root from 182.52.134.179 port 49816 ssh2
...
2019-11-09 08:45:20
74.141.132.233 attack
Nov  8 13:01:34 hpm sshd\[9795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-74-141-132-233.kya.res.rr.com  user=root
Nov  8 13:01:36 hpm sshd\[9795\]: Failed password for root from 74.141.132.233 port 56728 ssh2
Nov  8 13:05:37 hpm sshd\[10116\]: Invalid user fs5 from 74.141.132.233
Nov  8 13:05:38 hpm sshd\[10116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-74-141-132-233.kya.res.rr.com
Nov  8 13:05:39 hpm sshd\[10116\]: Failed password for invalid user fs5 from 74.141.132.233 port 38168 ssh2
2019-11-09 08:44:12
89.248.160.193 attackspambots
firewall-block, port(s): 3251/tcp
2019-11-09 08:06:00
51.83.78.56 attackbotsspam
Nov  9 00:52:33 vps691689 sshd[21878]: Failed password for root from 51.83.78.56 port 54944 ssh2
Nov  9 00:56:03 vps691689 sshd[21983]: Failed password for root from 51.83.78.56 port 36066 ssh2
...
2019-11-09 08:12:40
91.122.62.47 attackspambots
Nov  9 00:34:20 serwer sshd\[32734\]: Invalid user monoceros from 91.122.62.47 port 9225
Nov  9 00:34:20 serwer sshd\[32734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.122.62.47
Nov  9 00:34:21 serwer sshd\[32734\]: Failed password for invalid user monoceros from 91.122.62.47 port 9225 ssh2
...
2019-11-09 08:22:24
40.77.167.50 attackbotsspam
Automatic report - Banned IP Access
2019-11-09 08:17:11
129.226.68.217 attackspam
Nov  8 23:56:15 v22018076622670303 sshd\[8556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.68.217  user=root
Nov  8 23:56:16 v22018076622670303 sshd\[8556\]: Failed password for root from 129.226.68.217 port 60250 ssh2
Nov  9 00:00:33 v22018076622670303 sshd\[8589\]: Invalid user hotkey from 129.226.68.217 port 42330
...
2019-11-09 08:37:07
218.78.15.235 attack
Nov  8 13:43:11 web9 sshd\[5950\]: Invalid user pierre from 218.78.15.235
Nov  8 13:43:11 web9 sshd\[5950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.15.235
Nov  8 13:43:13 web9 sshd\[5950\]: Failed password for invalid user pierre from 218.78.15.235 port 41650 ssh2
Nov  8 13:47:40 web9 sshd\[6638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.15.235  user=root
Nov  8 13:47:42 web9 sshd\[6638\]: Failed password for root from 218.78.15.235 port 49404 ssh2
2019-11-09 08:06:11

Recently Reported IPs

104.22.2.142 104.22.2.156 104.22.2.150 104.22.2.14
104.22.2.157 104.22.2.162 104.22.2.164 104.22.2.161
104.22.2.170 104.22.2.174 104.22.2.165 104.22.2.179
104.22.2.180 104.22.2.19 104.22.2.192 104.22.2.199
104.22.2.200 104.22.2.182 104.22.2.210 104.22.2.217