Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.2.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.2.46.			IN	A

;; AUTHORITY SECTION:
.			330	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:27:31 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 46.2.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 46.2.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.87.84.242 attackspambots
Oct  6 04:27:51 w sshd[24634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.87.84.242  user=r.r
Oct  6 04:27:53 w sshd[24634]: Failed password for r.r from 125.87.84.242 port 47995 ssh2
Oct  6 04:28:01 w sshd[24634]: Received disconnect from 125.87.84.242 port 47995:11: Bye Bye [preauth]
Oct  6 04:28:01 w sshd[24634]: Disconnected from 125.87.84.242 port 47995 [preauth]
Oct  6 04:33:34 w sshd[24657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.87.84.242  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.87.84.242
2020-10-06 15:13:09
51.178.83.124 attackspam
Invalid user solaris from 51.178.83.124 port 47298
2020-10-06 14:41:48
110.49.71.242 attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-06T01:27:47Z
2020-10-06 14:43:47
203.110.89.230 attack
Dovecot Invalid User Login Attempt.
2020-10-06 15:00:05
139.199.62.142 attackspam
Oct  5 07:17:09 ovpn sshd[31807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.62.142  user=r.r
Oct  5 07:17:11 ovpn sshd[31807]: Failed password for r.r from 139.199.62.142 port 47194 ssh2
Oct  5 07:17:12 ovpn sshd[31807]: Received disconnect from 139.199.62.142 port 47194:11: Bye Bye [preauth]
Oct  5 07:17:12 ovpn sshd[31807]: Disconnected from 139.199.62.142 port 47194 [preauth]
Oct  5 07:29:47 ovpn sshd[2406]: Connection closed by 139.199.62.142 port 48164 [preauth]
Oct  5 07:33:51 ovpn sshd[3496]: Bad protocol version identification '-HSS2.0-libssh-0.6.3' from 139.199.62.142 port 34662
Oct  5 07:37:58 ovpn sshd[4519]: Bad protocol version identification '-HSS2.0-libssh-0.6.3' from 139.199.62.142 port 49380
Oct  5 07:42:07 ovpn sshd[5550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.62.142  user=r.r
Oct  5 07:42:10 ovpn sshd[5550]: Failed password for r.r from 139.1........
------------------------------
2020-10-06 14:57:05
27.202.239.187 attackbotsspam
Oct 5 22:42:14 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=27.202.239.187 DST=79.143.186.54 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=57803 DF PROTO=TCP SPT=32882 DPT=80 WINDOW=29040 RES=0x00 SYN URGP=0 Oct 5 22:42:15 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=27.202.239.187 DST=79.143.186.54 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=57804 DF PROTO=TCP SPT=32882 DPT=80 WINDOW=29040 RES=0x00 SYN URGP=0 Oct 5 22:42:17 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=27.202.239.187 DST=79.143.186.54 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=57805 DF PROTO=TCP SPT=32882 DPT=80 WINDOW=29040 RES=0x00 SYN URGP=0
2020-10-06 14:35:53
180.253.21.149 attack
20/10/5@16:42:05: FAIL: Alarm-Network address from=180.253.21.149
20/10/5@16:42:05: FAIL: Alarm-Network address from=180.253.21.149
...
2020-10-06 14:45:45
51.158.124.238 attack
Invalid user wt from 51.158.124.238 port 41322
2020-10-06 15:18:24
20.185.81.158 attack
Icarus honeypot on github
2020-10-06 15:06:39
27.157.90.107 attackspam
Oct  5 23:08:22 srv01 postfix/smtpd\[12943\]: warning: unknown\[27.157.90.107\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 23:22:06 srv01 postfix/smtpd\[31850\]: warning: unknown\[27.157.90.107\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 23:22:18 srv01 postfix/smtpd\[31850\]: warning: unknown\[27.157.90.107\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 23:22:34 srv01 postfix/smtpd\[31850\]: warning: unknown\[27.157.90.107\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 23:22:52 srv01 postfix/smtpd\[31850\]: warning: unknown\[27.157.90.107\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-06 15:00:31
35.229.26.153 attackbots
[f2b] sshd bruteforce, retries: 1
2020-10-06 14:44:10
151.236.59.142 attackbots
Port scanning [2 denied]
2020-10-06 14:52:15
192.162.178.41 attackspambots
Attempted Brute Force (dovecot)
2020-10-06 14:51:44
36.111.181.248 attackbotsspam
Port Scan
...
2020-10-06 14:45:11
74.120.14.31 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-06 15:15:37

Recently Reported IPs

104.22.2.49 104.22.2.53 104.22.2.55 104.22.2.56
104.22.2.57 104.22.2.6 104.22.2.60 104.22.2.61
104.22.2.67 104.22.2.70 104.22.2.73 104.22.2.81
104.22.2.75 104.22.2.80 104.22.2.74 104.22.2.86
104.22.2.82 104.22.2.89 104.22.2.92 104.22.2.95