Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.37.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18912
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.37.69.			IN	A

;; AUTHORITY SECTION:
.			130	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031901 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 20 12:14:45 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 69.37.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.37.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.131.152.2 attackbotsspam
Jul 29 09:08:47 debian sshd\[9001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.152.2  user=root
Jul 29 09:08:49 debian sshd\[9001\]: Failed password for root from 202.131.152.2 port 57337 ssh2
...
2019-07-29 16:18:18
182.18.171.148 attack
Invalid user castis from 182.18.171.148 port 42904
2019-07-29 16:28:39
123.209.253.20 attackbots
Jul 29 08:10:48 mail sshd\[513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.209.253.20  user=root
Jul 29 08:10:50 mail sshd\[513\]: Failed password for root from 123.209.253.20 port 39255 ssh2
...
2019-07-29 16:20:10
197.55.237.46 attack
19/7/29@02:51:44: FAIL: IoT-Telnet address from=197.55.237.46
...
2019-07-29 16:19:33
3.213.119.219 attackbots
Jul 29 08:39:52 h2177944 sshd\[17958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.213.119.219  user=root
Jul 29 08:39:54 h2177944 sshd\[17958\]: Failed password for root from 3.213.119.219 port 33438 ssh2
Jul 29 08:51:16 h2177944 sshd\[18149\]: Invalid user 123456 from 3.213.119.219 port 41894
Jul 29 08:51:16 h2177944 sshd\[18149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.213.119.219
...
2019-07-29 16:38:22
123.206.178.65 attack
Jul 29 09:10:10 vtv3 sshd\[12804\]: Invalid user qaz987 from 123.206.178.65 port 10226
Jul 29 09:10:10 vtv3 sshd\[12804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.178.65
Jul 29 09:10:12 vtv3 sshd\[12804\]: Failed password for invalid user qaz987 from 123.206.178.65 port 10226 ssh2
Jul 29 09:17:10 vtv3 sshd\[16165\]: Invalid user zxin10 from 123.206.178.65 port 5332
Jul 29 09:17:10 vtv3 sshd\[16165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.178.65
Jul 29 09:29:13 vtv3 sshd\[21698\]: Invalid user qige from 123.206.178.65 port 39085
Jul 29 09:29:13 vtv3 sshd\[21698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.178.65
Jul 29 09:29:15 vtv3 sshd\[21698\]: Failed password for invalid user qige from 123.206.178.65 port 39085 ssh2
Jul 29 09:34:57 vtv3 sshd\[24438\]: Invalid user 1234\*\* from 123.206.178.65 port 21629
Jul 29 09:34:57 vtv3 sshd\[24
2019-07-29 16:08:58
159.203.77.51 attackspam
Jul 29 08:52:32 mail sshd[25495]: Invalid user applmgr from 159.203.77.51
...
2019-07-29 15:52:15
45.227.254.30 attack
:
2019-07-29 16:06:57
117.50.44.215 attackspambots
Jul 29 08:52:15 icinga sshd[12338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.44.215
Jul 29 08:52:17 icinga sshd[12338]: Failed password for invalid user FQCL!@#123 from 117.50.44.215 port 60678 ssh2
...
2019-07-29 16:03:36
159.89.111.136 attack
Jul 29 07:53:20 MK-Soft-VM3 sshd\[20522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136  user=root
Jul 29 07:53:22 MK-Soft-VM3 sshd\[20522\]: Failed password for root from 159.89.111.136 port 57194 ssh2
Jul 29 07:57:30 MK-Soft-VM3 sshd\[20688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136  user=root
...
2019-07-29 16:10:17
180.159.0.182 attackbots
Jul 29 03:28:23 *** sshd[19161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.159.0.182  user=r.r
Jul 29 03:28:26 *** sshd[19161]: Failed password for r.r from 180.159.0.182 port 48240 ssh2
Jul 29 03:28:26 *** sshd[19161]: Received disconnect from 180.159.0.182: 11: Bye Bye [preauth]
Jul 29 03:31:33 *** sshd[19849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.159.0.182  user=r.r
Jul 29 03:31:35 *** sshd[19849]: Failed password for r.r from 180.159.0.182 port 51536 ssh2
Jul 29 03:31:35 *** sshd[19849]: Received disconnect from 180.159.0.182: 11: Bye Bye [preauth]
Jul 29 03:34:03 *** sshd[19955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.159.0.182  user=r.r
Jul 29 03:34:05 *** sshd[19955]: Failed password for r.r from 180.159.0.182 port 48882 ssh2
Jul 29 03:34:06 *** sshd[19955]: Received disconnect from 180.159.0.182: 11: Bye By........
-------------------------------
2019-07-29 16:13:58
77.22.159.240 attackspambots
scan z
2019-07-29 15:52:44
182.52.70.167 attackbotsspam
Jul 29 10:50:58 server sshd\[13620\]: User root from 182.52.70.167 not allowed because listed in DenyUsers
Jul 29 10:50:58 server sshd\[13620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.52.70.167  user=root
Jul 29 10:51:00 server sshd\[13620\]: Failed password for invalid user root from 182.52.70.167 port 50950 ssh2
Jul 29 10:56:24 server sshd\[9358\]: User root from 182.52.70.167 not allowed because listed in DenyUsers
Jul 29 10:56:24 server sshd\[9358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.52.70.167  user=root
2019-07-29 16:07:49
173.249.35.213 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-07-29 16:27:08
177.50.74.118 attack
SSH/22 MH Probe, BF, Hack -
2019-07-29 16:04:14

Recently Reported IPs

104.22.37.43 104.22.38.142 104.22.38.170 104.22.38.174
104.22.38.197 104.22.38.251 104.22.48.113 104.22.48.201
104.22.49.113 104.22.49.201 104.22.52.151 104.22.52.165
104.22.52.167 104.22.52.188 104.22.53.151 104.22.53.165
104.22.53.167 104.22.53.188 104.22.56.81 104.22.57.81