Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.22.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.22.142.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:28:10 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 142.22.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.22.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.254.44.62 attackspam
VNC brute force attack detected by fail2ban
2020-07-06 01:45:56
51.91.143.21 attack
05.07.2020 18:15:12 - Wordpress fail 
Detected by ELinOX-ALM
2020-07-06 01:45:36
45.67.232.138 attackspambots
From mkbounces@planosparacnpj.live Sun Jul 05 14:44:34 2020
Received: from cnpjmx6.planosparacnpj.live ([45.67.232.138]:60013)
2020-07-06 02:04:52
192.241.216.202 attack
445/tcp 27017/tcp 3306/tcp...
[2020-06-28/07-05]7pkt,6pt.(tcp),1pt.(udp)
2020-07-06 02:12:35
220.129.178.96 attackbotsspam
Jul  5 19:19:05 journals sshd\[58509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.129.178.96  user=root
Jul  5 19:19:07 journals sshd\[58509\]: Failed password for root from 220.129.178.96 port 38440 ssh2
Jul  5 19:23:25 journals sshd\[58955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.129.178.96  user=root
Jul  5 19:23:27 journals sshd\[58955\]: Failed password for root from 220.129.178.96 port 38280 ssh2
Jul  5 19:28:00 journals sshd\[59355\]: Invalid user git from 220.129.178.96
Jul  5 19:28:00 journals sshd\[59355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.129.178.96
...
2020-07-06 01:27:18
222.82.253.106 attackspambots
Jul  5 23:32:12 dhoomketu sshd[1303139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.253.106 
Jul  5 23:32:12 dhoomketu sshd[1303139]: Invalid user com from 222.82.253.106 port 28950
Jul  5 23:32:14 dhoomketu sshd[1303139]: Failed password for invalid user com from 222.82.253.106 port 28950 ssh2
Jul  5 23:34:38 dhoomketu sshd[1303151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.253.106  user=root
Jul  5 23:34:40 dhoomketu sshd[1303151]: Failed password for root from 222.82.253.106 port 21908 ssh2
...
2020-07-06 02:11:48
207.200.8.182 attack
Automated report (2020-07-06T01:44:42+08:00). Misbehaving bot detected at this address.
2020-07-06 02:00:49
223.171.32.55 attackbotsspam
Jul  5 19:23:09 dhoomketu sshd[1299888]: Failed password for root from 223.171.32.55 port 42031 ssh2
Jul  5 19:24:48 dhoomketu sshd[1299901]: Invalid user mithun from 223.171.32.55 port 42032
Jul  5 19:24:48 dhoomketu sshd[1299901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55 
Jul  5 19:24:48 dhoomketu sshd[1299901]: Invalid user mithun from 223.171.32.55 port 42032
Jul  5 19:24:50 dhoomketu sshd[1299901]: Failed password for invalid user mithun from 223.171.32.55 port 42032 ssh2
...
2020-07-06 01:43:40
54.39.50.204 attackspambots
Jul  5 19:44:32 vm0 sshd[6648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.50.204
Jul  5 19:44:33 vm0 sshd[6648]: Failed password for invalid user archana from 54.39.50.204 port 13538 ssh2
...
2020-07-06 01:53:38
86.210.71.37 attack
$f2bV_matches
2020-07-06 02:07:47
88.254.11.85 attackbotsspam
88.254.11.85 - - [05/Jul/2020:18:43:41 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
88.254.11.85 - - [05/Jul/2020:18:43:44 +0100] "POST /wp-login.php HTTP/1.1" 200 7820 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
88.254.11.85 - - [05/Jul/2020:18:44:44 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-07-06 01:59:59
185.63.253.157 attackspambots
2020-07-05T17:47:15.061869mail.csmailer.org sshd[15708]: Failed password for root from 185.63.253.157 port 51134 ssh2
2020-07-05T17:48:48.450636mail.csmailer.org sshd[15845]: Invalid user support from 185.63.253.157 port 60272
2020-07-05T17:48:48.455348mail.csmailer.org sshd[15845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.63.253.157
2020-07-05T17:48:48.450636mail.csmailer.org sshd[15845]: Invalid user support from 185.63.253.157 port 60272
2020-07-05T17:48:50.448358mail.csmailer.org sshd[15845]: Failed password for invalid user support from 185.63.253.157 port 60272 ssh2
...
2020-07-06 01:49:20
34.72.148.13 attackbotsspam
Jul  5 12:02:47 ws26vmsma01 sshd[39049]: Failed password for root from 34.72.148.13 port 50378 ssh2
Jul  5 12:22:43 ws26vmsma01 sshd[117378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.72.148.13
...
2020-07-06 01:47:40
45.125.65.52 attack
Jul  5 19:38:32 srv01 postfix/smtpd\[9121\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  5 19:40:41 srv01 postfix/smtpd\[16331\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  5 19:41:56 srv01 postfix/smtpd\[9121\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  5 19:42:38 srv01 postfix/smtpd\[16794\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  5 19:44:48 srv01 postfix/smtpd\[20913\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-06 01:54:08
222.186.175.150 attackspam
Jul  5 19:27:19 minden010 sshd[26242]: Failed password for root from 222.186.175.150 port 8024 ssh2
Jul  5 19:27:33 minden010 sshd[26242]: error: maximum authentication attempts exceeded for root from 222.186.175.150 port 8024 ssh2 [preauth]
Jul  5 19:27:39 minden010 sshd[26290]: Failed password for root from 222.186.175.150 port 13258 ssh2
...
2020-07-06 01:34:35

Recently Reported IPs

104.22.22.149 104.22.22.156 104.22.22.140 104.22.22.162
104.22.22.176 104.22.22.181 104.22.22.193 104.22.22.189
104.22.22.191 104.22.22.194 104.22.22.197 104.22.22.206
104.22.22.204 104.22.22.199 104.22.22.217 104.22.22.227
104.22.22.231 104.22.22.238 104.22.22.236 104.22.22.242