Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.26.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56292
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.26.116.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:29:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 116.26.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 116.26.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.196.90.254 attackbots
Jul 16 15:46:52 vm1 sshd[20191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.90.254
Jul 16 15:46:54 vm1 sshd[20191]: Failed password for invalid user damares from 116.196.90.254 port 52550 ssh2
...
2020-07-17 01:25:09
96.46.27.0 attackspambots
Jul 15 21:31:42 vzmaster sshd[31341]: Address 96.46.27.0 maps to 96.46.27.0.nwinternet.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul 15 21:31:42 vzmaster sshd[31341]: Invalid user admin from 96.46.27.0
Jul 15 21:31:42 vzmaster sshd[31341]: Failed none for invalid user admin from 96.46.27.0 port 60050 ssh2
Jul 15 21:31:42 vzmaster sshd[31341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.46.27.0 
Jul 15 21:31:44 vzmaster sshd[31341]: Failed password for invalid user admin from 96.46.27.0 port 60050 ssh2
Jul 15 21:31:45 vzmaster sshd[31374]: Address 96.46.27.0 maps to 96.46.27.0.nwinternet.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul 15 21:31:46 vzmaster sshd[31374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.46.27.0  user=r.r
Jul 15 21:31:48 vzmaster sshd[31374]: Failed password for r.r from 96.46.27.0 port 601........
-------------------------------
2020-07-17 01:39:05
46.161.63.79 attackbots
Forbidden access
2020-07-17 01:43:35
157.230.163.6 attackspambots
Jul 16 20:00:32 lukav-desktop sshd\[32011\]: Invalid user tiago from 157.230.163.6
Jul 16 20:00:32 lukav-desktop sshd\[32011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6
Jul 16 20:00:34 lukav-desktop sshd\[32011\]: Failed password for invalid user tiago from 157.230.163.6 port 58128 ssh2
Jul 16 20:05:42 lukav-desktop sshd\[25516\]: Invalid user sma from 157.230.163.6
Jul 16 20:05:42 lukav-desktop sshd\[25516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6
2020-07-17 01:07:33
200.105.194.242 attack
Jul 16 18:36:40 lnxded63 sshd[32313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.105.194.242
Jul 16 18:36:42 lnxded63 sshd[32313]: Failed password for invalid user oracle from 200.105.194.242 port 8154 ssh2
Jul 16 18:40:57 lnxded63 sshd[339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.105.194.242
2020-07-17 01:13:43
129.211.52.192 attackspambots
Jul 16 17:48:24 pornomens sshd\[31074\]: Invalid user yanwei from 129.211.52.192 port 52432
Jul 16 17:48:24 pornomens sshd\[31074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.52.192
Jul 16 17:48:27 pornomens sshd\[31074\]: Failed password for invalid user yanwei from 129.211.52.192 port 52432 ssh2
...
2020-07-17 01:42:47
129.204.177.7 attack
Jul 16 15:54:04 rush sshd[21913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.177.7
Jul 16 15:54:06 rush sshd[21913]: Failed password for invalid user huang from 129.204.177.7 port 45640 ssh2
Jul 16 15:59:23 rush sshd[22068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.177.7
...
2020-07-17 01:33:31
110.74.179.157 attackbots
Jul 16 18:08:17 rocket sshd[5039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.74.179.157
Jul 16 18:08:19 rocket sshd[5039]: Failed password for invalid user stefan from 110.74.179.157 port 42370 ssh2
Jul 16 18:12:08 rocket sshd[5725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.74.179.157
...
2020-07-17 01:15:56
134.17.94.214 attackspambots
Jul 16 09:15:52 mockhub sshd[14558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.214
Jul 16 09:15:54 mockhub sshd[14558]: Failed password for invalid user gigel from 134.17.94.214 port 7119 ssh2
...
2020-07-17 01:12:33
141.98.80.53 attackbots
Jul 16 19:31:03 relay postfix/smtpd\[9430\]: warning: unknown\[141.98.80.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 19:31:03 relay postfix/smtpd\[8413\]: warning: unknown\[141.98.80.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 19:33:35 relay postfix/smtpd\[8453\]: warning: unknown\[141.98.80.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 19:33:35 relay postfix/smtpd\[14245\]: warning: unknown\[141.98.80.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 19:36:17 relay postfix/smtpd\[14245\]: warning: unknown\[141.98.80.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 19:36:17 relay postfix/smtpd\[8413\]: warning: unknown\[141.98.80.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-17 01:37:19
40.114.34.95 attack
Multiple SSH login attempts.
2020-07-17 01:17:02
218.92.0.148 attackspambots
20/7/16@13:33:15: FAIL: IoT-SSH address from=218.92.0.148
...
2020-07-17 01:45:08
91.82.85.85 attack
Jul 15 20:39:04 v26 sshd[6801]: Invalid user ochsner from 91.82.85.85 port 56224
Jul 15 20:39:04 v26 sshd[6801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.82.85.85
Jul 15 20:39:05 v26 sshd[6801]: Failed password for invalid user ochsner from 91.82.85.85 port 56224 ssh2
Jul 15 20:39:05 v26 sshd[6801]: Received disconnect from 91.82.85.85 port 56224:11: Bye Bye [preauth]
Jul 15 20:39:05 v26 sshd[6801]: Disconnected from 91.82.85.85 port 56224 [preauth]
Jul 15 20:53:53 v26 sshd[9266]: Invalid user david from 91.82.85.85 port 41922
Jul 15 20:53:53 v26 sshd[9266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.82.85.85
Jul 15 20:53:55 v26 sshd[9266]: Failed password for invalid user david from 91.82.85.85 port 41922 ssh2
Jul 15 20:53:55 v26 sshd[9266]: Received disconnect from 91.82.85.85 port 41922:11: Bye Bye [preauth]
Jul 15 20:53:55 v26 sshd[9266]: Disconnected from 91.82.85.85 p........
-------------------------------
2020-07-17 01:31:22
49.88.112.76 attackspambots
Jul 16 13:56:36 firewall sshd[26217]: Failed password for root from 49.88.112.76 port 34290 ssh2
Jul 16 13:56:39 firewall sshd[26217]: Failed password for root from 49.88.112.76 port 34290 ssh2
Jul 16 13:56:42 firewall sshd[26217]: Failed password for root from 49.88.112.76 port 34290 ssh2
...
2020-07-17 01:34:01
60.51.18.180 attackbotsspam
Invalid user sam from 60.51.18.180 port 59795
2020-07-17 01:33:15

Recently Reported IPs

104.22.26.114 104.22.26.115 104.22.26.121 104.22.26.119
104.22.26.124 104.22.26.123 104.22.26.138 104.22.26.142
104.22.26.151 104.22.26.145 104.22.26.144 104.22.26.143
104.22.26.159 104.22.26.152 104.22.26.161 104.22.26.162
104.22.26.164 104.22.26.165 104.22.26.171 104.22.26.168