Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.27.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.27.244.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:30:01 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 244.27.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.27.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.27.10.20 attack
Dec 14 08:57:34 MK-Soft-Root1 sshd[25703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.27.10.20 
Dec 14 08:57:36 MK-Soft-Root1 sshd[25703]: Failed password for invalid user guest from 93.27.10.20 port 56944 ssh2
...
2019-12-14 16:40:16
47.8.220.132 attackbotsspam
1576304835 - 12/14/2019 07:27:15 Host: 47.8.220.132/47.8.220.132 Port: 445 TCP Blocked
2019-12-14 17:07:43
122.51.156.53 attackbotsspam
Dec 14 09:49:07 legacy sshd[22919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.156.53
Dec 14 09:49:09 legacy sshd[22919]: Failed password for invalid user spice4 from 122.51.156.53 port 59366 ssh2
Dec 14 09:55:46 legacy sshd[23142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.156.53
...
2019-12-14 17:10:43
159.203.27.100 attackspambots
Automatic report - XMLRPC Attack
2019-12-14 16:38:00
36.91.42.35 attackspambots
Unauthorized connection attempt from IP address 36.91.42.35 on Port 445(SMB)
2019-12-14 16:33:49
106.13.109.74 attackspam
Dec 14 09:36:59 localhost sshd\[14658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.109.74  user=root
Dec 14 09:37:01 localhost sshd\[14658\]: Failed password for root from 106.13.109.74 port 34866 ssh2
Dec 14 09:45:10 localhost sshd\[15880\]: Invalid user belle from 106.13.109.74 port 36208
2019-12-14 16:57:28
159.203.73.181 attackbotsspam
Dec 14 09:46:15 lnxweb62 sshd[13244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.73.181
2019-12-14 16:51:50
209.97.129.231 attack
Automatic report - XMLRPC Attack
2019-12-14 16:50:46
139.99.219.208 attackspam
Dec 14 08:36:18 web8 sshd\[20443\]: Invalid user !Pa\$\$word from 139.99.219.208
Dec 14 08:36:18 web8 sshd\[20443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.219.208
Dec 14 08:36:20 web8 sshd\[20443\]: Failed password for invalid user !Pa\$\$word from 139.99.219.208 port 39614 ssh2
Dec 14 08:43:04 web8 sshd\[23939\]: Invalid user password666 from 139.99.219.208
Dec 14 08:43:04 web8 sshd\[23939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.219.208
2019-12-14 17:01:34
163.172.19.244 attack
Automatic report - XMLRPC Attack
2019-12-14 16:43:45
151.80.140.166 attack
Dec 13 22:19:47 auw2 sshd\[28344\]: Invalid user tele from 151.80.140.166
Dec 13 22:19:47 auw2 sshd\[28344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dev.geronimo-dev.ovh
Dec 13 22:19:49 auw2 sshd\[28344\]: Failed password for invalid user tele from 151.80.140.166 port 40000 ssh2
Dec 13 22:24:54 auw2 sshd\[28840\]: Invalid user rungroj from 151.80.140.166
Dec 13 22:24:54 auw2 sshd\[28840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dev.geronimo-dev.ovh
2019-12-14 16:32:07
185.156.73.64 attackbots
12/14/2019-03:38:57.459241 185.156.73.64 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-14 16:46:33
62.218.84.53 attackbotsspam
Dec 14 08:00:36 zeus sshd[17900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.218.84.53 
Dec 14 08:00:38 zeus sshd[17900]: Failed password for invalid user mgmt from 62.218.84.53 port 52645 ssh2
Dec 14 08:06:23 zeus sshd[18102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.218.84.53 
Dec 14 08:06:24 zeus sshd[18102]: Failed password for invalid user paulette from 62.218.84.53 port 33348 ssh2
2019-12-14 16:37:11
122.14.228.229 attackspambots
Dec 14 09:29:06 MK-Soft-VM6 sshd[17230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.228.229 
Dec 14 09:29:08 MK-Soft-VM6 sshd[17230]: Failed password for invalid user qj from 122.14.228.229 port 46132 ssh2
...
2019-12-14 16:44:10
54.68.234.36 attackbots
Invalid user test2 from 54.68.234.36 port 34586
2019-12-14 17:02:47

Recently Reported IPs

104.22.27.232 104.22.27.251 104.22.27.253 104.22.27.254
104.22.27.66 104.22.27.68 104.22.27.64 104.22.27.70
104.22.27.77 104.22.27.80 104.22.27.82 104.22.27.86
104.22.27.81 104.22.27.92 104.22.28.102 104.22.28.112
104.22.28.113 104.22.28.114 104.22.27.98 104.22.28.120