Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.2.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.2.19.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:27:22 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 19.2.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.2.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.241.158.230 attackbots
firewall-block, port(s): 1433/tcp
2019-12-07 19:38:49
220.180.121.6 attackspambots
Brute force attempt
2019-12-07 19:30:40
61.177.172.128 attackbotsspam
2019-12-07T11:51:56.309318hub.schaetter.us sshd\[22367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
2019-12-07T11:51:58.737385hub.schaetter.us sshd\[22367\]: Failed password for root from 61.177.172.128 port 2213 ssh2
2019-12-07T11:52:03.100068hub.schaetter.us sshd\[22367\]: Failed password for root from 61.177.172.128 port 2213 ssh2
2019-12-07T11:52:06.198548hub.schaetter.us sshd\[22367\]: Failed password for root from 61.177.172.128 port 2213 ssh2
2019-12-07T11:52:09.370343hub.schaetter.us sshd\[22367\]: Failed password for root from 61.177.172.128 port 2213 ssh2
...
2019-12-07 19:56:18
50.197.162.169 attackspambots
2019-12-07T07:26:28.461635MailD postfix/smtpd[14951]: NOQUEUE: reject: RCPT from 50-197-162-169-static.hfc.comcastbusiness.net[50.197.162.169]: 554 5.7.1 Service unavailable; Client host [50.197.162.169] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?50.197.162.169; from= to= proto=ESMTP helo=<50-197-162-169-static.hfc.comcastbusiness.net>
2019-12-07T07:26:28.884812MailD postfix/smtpd[14951]: NOQUEUE: reject: RCPT from 50-197-162-169-static.hfc.comcastbusiness.net[50.197.162.169]: 554 5.7.1 Service unavailable; Client host [50.197.162.169] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?50.197.162.169; from= to= proto=ESMTP helo=<50-197-162-169-static.hfc.comcastbusiness.net>
2019-12-07T07:26:29.283499MailD postfix/smtpd[14951]: NOQUEUE: reject: RCPT from 50-197-162-169-static.hfc.comcastbusiness.net[50.197.162.169]: 554 5.7.1 Ser
2019-12-07 19:31:49
165.227.26.69 attackbots
Dec  7 06:25:15 ny01 sshd[6506]: Failed password for news from 165.227.26.69 port 46912 ssh2
Dec  7 06:31:50 ny01 sshd[7416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.26.69
Dec  7 06:31:51 ny01 sshd[7416]: Failed password for invalid user test from 165.227.26.69 port 55882 ssh2
2019-12-07 19:34:47
148.72.210.28 attackspambots
Dec  7 12:35:21 localhost sshd\[800\]: Invalid user jaenisch from 148.72.210.28 port 36234
Dec  7 12:35:21 localhost sshd\[800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.210.28
Dec  7 12:35:23 localhost sshd\[800\]: Failed password for invalid user jaenisch from 148.72.210.28 port 36234 ssh2
2019-12-07 19:53:13
45.85.217.208 attackspam
Dec  7 07:56:52 legacy sshd[28285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.85.217.208
Dec  7 07:56:54 legacy sshd[28285]: Failed password for invalid user edmonds from 45.85.217.208 port 53952 ssh2
Dec  7 08:02:51 legacy sshd[28519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.85.217.208
...
2019-12-07 19:29:47
129.204.0.32 attackspambots
Lines containing failures of 129.204.0.32
Dec  6 05:00:21 keyhelp sshd[22562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.0.32  user=r.r
Dec  6 05:00:22 keyhelp sshd[22562]: Failed password for r.r from 129.204.0.32 port 37180 ssh2
Dec  6 05:00:23 keyhelp sshd[22562]: Received disconnect from 129.204.0.32 port 37180:11: Bye Bye [preauth]
Dec  6 05:00:23 keyhelp sshd[22562]: Disconnected from authenticating user r.r 129.204.0.32 port 37180 [preauth]
Dec  6 05:31:16 keyhelp sshd[32379]: Invalid user brussel from 129.204.0.32 port 45954
Dec  6 05:31:16 keyhelp sshd[32379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.0.32
Dec  6 05:31:18 keyhelp sshd[32379]: Failed password for invalid user brussel from 129.204.0.32 port 45954 ssh2
Dec  6 05:31:18 keyhelp sshd[32379]: Received disconnect from 129.204.0.32 port 45954:11: Bye Bye [preauth]
Dec  6 05:31:18 keyhelp sshd[32379........
------------------------------
2019-12-07 19:25:07
185.50.196.127 attackbots
Automatic report - XMLRPC Attack
2019-12-07 19:44:10
142.44.184.226 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2019-12-07 19:41:50
158.69.48.197 attackbots
Fail2Ban - SSH Bruteforce Attempt
2019-12-07 19:33:28
165.22.144.147 attackspam
Dec  7 12:34:05 vps691689 sshd[17867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.147
Dec  7 12:34:07 vps691689 sshd[17867]: Failed password for invalid user freemon from 165.22.144.147 port 35476 ssh2
...
2019-12-07 19:48:15
104.248.26.43 attackspam
Dec  7 03:38:05 server sshd\[6474\]: Failed password for invalid user annice from 104.248.26.43 port 36234 ssh2
Dec  7 12:33:34 server sshd\[20509\]: Invalid user zackarylee from 104.248.26.43
Dec  7 12:33:34 server sshd\[20509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.26.43 
Dec  7 12:33:36 server sshd\[20509\]: Failed password for invalid user zackarylee from 104.248.26.43 port 51278 ssh2
Dec  7 12:43:44 server sshd\[23190\]: Invalid user denna from 104.248.26.43
Dec  7 12:43:44 server sshd\[23190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.26.43 
...
2019-12-07 19:42:09
43.243.75.14 attackspambots
Dec  7 12:19:11 MK-Soft-VM7 sshd[9243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.75.14 
Dec  7 12:19:13 MK-Soft-VM7 sshd[9243]: Failed password for invalid user com from 43.243.75.14 port 32978 ssh2
...
2019-12-07 19:52:40
200.89.178.214 attack
Dec  7 11:48:12 icinga sshd[26133]: Failed password for root from 200.89.178.214 port 42254 ssh2
...
2019-12-07 19:46:32

Recently Reported IPs

104.22.2.180 104.22.2.192 104.22.2.199 104.22.2.200
104.22.2.182 104.22.2.210 104.22.2.217 104.22.2.215
104.22.2.219 104.22.2.225 104.22.2.222 104.22.2.23
104.22.2.224 104.22.2.234 104.22.2.230 104.22.2.237
104.22.2.236 104.22.2.238 104.22.2.239 104.22.2.245