Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.22.34.100 proxynormal
Belongs to views4you.com
This IS a scam organization. They get your money and you never hear from them again.
2023-08-21 18:28:07
104.22.34.100 proxynormal
Belongs to views4you.com
This IS a scam organization. They get your money and you never hear from them again.
2023-08-21 18:28:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.34.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25172
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.34.252.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032102 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 22 06:16:01 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 252.34.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.34.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
205.144.171.100 attackspambots
http://www.kleinanzeigen-e14d3w13.com/login.php

Looks like Ebay, but it's NOT!!! Take care!
2019-11-29 00:29:41
119.3.222.183 attackbots
CMS brute force
...
2019-11-29 00:42:07
106.51.33.29 attack
$f2bV_matches
2019-11-29 00:43:17
187.133.78.48 attackspam
Unauthorised access (Nov 28) SRC=187.133.78.48 LEN=52 TTL=105 ID=29983 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-29 01:13:14
123.21.190.53 attack
3,59-10/02 [bc00/m01] PostRequest-Spammer scoring: madrid
2019-11-29 00:37:07
51.15.9.27 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-29 00:54:09
124.74.248.218 attackspambots
Nov 28 17:21:31 legacy sshd[1075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218
Nov 28 17:21:33 legacy sshd[1075]: Failed password for invalid user huichaun from 124.74.248.218 port 33454 ssh2
Nov 28 17:25:39 legacy sshd[1214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218
...
2019-11-29 00:32:22
157.55.39.151 attack
Automatic report - Banned IP Access
2019-11-29 00:55:02
61.172.142.58 attackbots
Nov 28 15:37:15 zeus postfix/smtpd\[18303\]: warning: unknown\[61.172.142.58\]: SASL LOGIN authentication failed: authentication failure
Nov 28 15:37:19 zeus postfix/smtpd\[18303\]: warning: unknown\[61.172.142.58\]: SASL LOGIN authentication failed: authentication failure
Nov 28 15:37:22 zeus postfix/smtpd\[18303\]: warning: unknown\[61.172.142.58\]: SASL LOGIN authentication failed: authentication failure
...
2019-11-29 00:50:34
24.142.48.139 attackspam
RDP Bruteforce
2019-11-29 00:41:27
139.155.33.169 attackbotsspam
Automatic report - Banned IP Access
2019-11-29 00:49:31
5.55.78.103 attack
port scan and connect, tcp 8080 (http-proxy)
2019-11-29 00:59:13
193.188.22.229 attackspam
Nov 28 17:09:59 XXX sshd[47226]: Invalid user toto from 193.188.22.229 port 55458
2019-11-29 01:10:55
103.81.84.140 attackbots
xmlrpc attack
2019-11-29 00:40:59
83.212.82.230 attackspam
Nov 28 08:31:19 dallas01 sshd[30832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.212.82.230
Nov 28 08:31:21 dallas01 sshd[30832]: Failed password for invalid user chellappa from 83.212.82.230 port 50840 ssh2
Nov 28 08:36:39 dallas01 sshd[31717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.212.82.230
2019-11-29 00:58:13

Recently Reported IPs

104.22.31.108 104.22.35.252 104.22.35.64 104.22.38.192
104.22.39.192 104.22.40.204 15.222.217.28 104.22.41.204
104.22.44.103 104.22.45.103 104.22.46.113 104.22.46.87
104.22.47.113 104.22.47.87 104.22.56.220 104.22.56.98
104.22.57.220 104.22.57.98 104.22.68.132 104.22.68.46