Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.28.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.28.71.			IN	A

;; AUTHORITY SECTION:
.			308	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052200 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 22 22:58:16 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 71.28.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.28.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.39.11.38 attackspam
06/06/2020-14:31:51.523941 185.39.11.38 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-07 02:41:02
185.39.11.57 attackspambots
Jun  6 21:31:22 debian kernel: [370841.940255] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=185.39.11.57 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=31762 PROTO=TCP SPT=52342 DPT=30048 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-07 02:39:45
194.26.29.135 attackbots
scans 39 times in preceeding hours on the ports (in chronological order) 5011 5288 5565 5094 5791 5475 5538 5711 5954 5198 5473 5452 5958 5728 5130 5027 5182 5764 5018 5282 5404 5739 5273 5325 5527 5177 5953 5717 5722 5685 5793 5300 5745 5502 5550 5721 5194 5826 5246 resulting in total of 612 scans from 194.26.29.0/24 block.
2020-06-07 02:19:45
195.54.166.47 attackspambots
RU_OOO Network of data-centers Selectel_<177>1591464427 [1:2402000:5565] ET DROP Dshield Block Listed Source group 1 [Classification: Misc Attack] [Priority: 2]:  {TCP} 195.54.166.47:48388
2020-06-07 02:29:10
194.26.29.132 attack
scans 40 times in preceeding hours on the ports (in chronological order) 2301 2330 2828 2979 2956 2683 2865 2422 2357 2426 2658 2663 2160 2832 2776 2583 2441 2321 2453 2271 2905 2361 2727 2330 2289 2932 2223 2330 2652 2549 2961 2897 2367 2801 2763 2181 2862 2911 2694 2861 resulting in total of 612 scans from 194.26.29.0/24 block.
2020-06-07 02:29:54
206.189.134.48 attackspambots
scans once in preceeding hours on the ports (in chronological order) 18950 resulting in total of 4 scans from 206.189.0.0/16 block.
2020-06-07 02:26:23
142.93.187.179 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 2251 2253
2020-06-07 02:05:43
185.153.196.225 attackspambots
06/06/2020-13:48:23.076347 185.153.196.225 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-07 02:39:10
195.54.167.120 attackbotsspam
Jun  6 19:50:47 debian-2gb-nbg1-2 kernel: \[13724595.517385\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.120 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=11804 PROTO=TCP SPT=52384 DPT=1020 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-07 02:27:24
138.197.12.187 attackbotsspam
Jun  6 18:43:43 debian-2gb-nbg1-2 kernel: \[13720571.443043\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=138.197.12.187 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=TCP SPT=47891 DPT=7007 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-07 02:06:42
126.23.145.60 attack
scans 2 times in preceeding hours on the ports (in chronological order) 17621 17621
2020-06-07 02:09:43
194.26.29.137 attack
scans 47 times in preceeding hours on the ports (in chronological order) 8103 8838 8425 8172 8570 8151 8465 8542 8565 8035 8596 8611 8661 8375 8513 8582 8741 8897 8609 8194 8018 8407 8295 8290 8155 8178 8071 8823 8536 8451 8542 8249 8870 8897 8171 8616 8713 8327 8565 8966 8024 8064 8226 8783 8869 8267 8995 resulting in total of 612 scans from 194.26.29.0/24 block.
2020-06-07 02:19:24
194.26.29.148 attackbots
scans 56 times in preceeding hours on the ports (in chronological order) 13775 13035 13752 13043 13339 13813 13554 13160 13358 13308 13802 13745 13541 13278 13951 13126 13149 13177 13646 13371 13718 13166 13287 13794 13032 13681 13540 13817 13020 13808 13811 13705 13995 13037 13751 13220 13296 13658 13600 13370 13492 13354 13356 13550 13840 13842 13475 13485 13124 13189 13464 13668 13041 13612 13078 13375 resulting in total of 612 scans from 194.26.29.0/24 block.
2020-06-07 02:18:29
185.176.27.210 attackbots
scans 8 times in preceeding hours on the ports (in chronological order) 3475 3462 3461 3434 3489 3462 3428 3495 resulting in total of 81 scans from 185.176.27.0/24 block.
2020-06-07 02:33:44
167.172.156.227 attackspambots
 TCP (SYN) 167.172.156.227:50929 -> port 13257, len 44
2020-06-07 02:45:07

Recently Reported IPs

104.22.28.175 104.22.32.245 104.22.33.245 104.22.36.129
104.22.37.129 104.22.38.65 104.22.39.65 104.22.40.168
104.22.41.168 104.22.50.113 104.22.51.113 104.22.54.168
104.22.55.168 104.22.60.182 104.22.60.231 104.22.61.182
104.22.61.231 104.22.63.144 104.22.64.209 104.22.64.244