Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.4.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.4.150.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:34:01 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 150.4.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.4.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.200 attackbots
2020-07-04T15:00:48.262604vps751288.ovh.net sshd\[16932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200  user=root
2020-07-04T15:00:50.132753vps751288.ovh.net sshd\[16932\]: Failed password for root from 112.85.42.200 port 10606 ssh2
2020-07-04T15:00:53.180943vps751288.ovh.net sshd\[16932\]: Failed password for root from 112.85.42.200 port 10606 ssh2
2020-07-04T15:00:57.285792vps751288.ovh.net sshd\[16932\]: Failed password for root from 112.85.42.200 port 10606 ssh2
2020-07-04T15:01:00.644829vps751288.ovh.net sshd\[16932\]: Failed password for root from 112.85.42.200 port 10606 ssh2
2020-07-04 21:02:33
36.103.245.30 attackbotsspam
Jul  4 18:02:16 dhoomketu sshd[1272427]: Failed password for root from 36.103.245.30 port 42360 ssh2
Jul  4 18:04:47 dhoomketu sshd[1272437]: Invalid user zabbix from 36.103.245.30 port 45492
Jul  4 18:04:47 dhoomketu sshd[1272437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.103.245.30 
Jul  4 18:04:47 dhoomketu sshd[1272437]: Invalid user zabbix from 36.103.245.30 port 45492
Jul  4 18:04:49 dhoomketu sshd[1272437]: Failed password for invalid user zabbix from 36.103.245.30 port 45492 ssh2
...
2020-07-04 20:44:05
138.68.226.234 attackspambots
Jul  4 14:04:00 abendstille sshd\[5511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.226.234  user=root
Jul  4 14:04:02 abendstille sshd\[5511\]: Failed password for root from 138.68.226.234 port 44418 ssh2
Jul  4 14:08:32 abendstille sshd\[9910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.226.234  user=root
Jul  4 14:08:34 abendstille sshd\[9910\]: Failed password for root from 138.68.226.234 port 43274 ssh2
Jul  4 14:13:29 abendstille sshd\[14639\]: Invalid user click from 138.68.226.234
Jul  4 14:13:30 abendstille sshd\[14639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.226.234
...
2020-07-04 21:23:03
112.243.125.176 attackbotsspam
[portscan] Port scan
2020-07-04 21:02:09
222.186.175.148 attackspambots
Jul  4 15:12:17 jane sshd[31552]: Failed password for root from 222.186.175.148 port 20616 ssh2
Jul  4 15:12:22 jane sshd[31552]: Failed password for root from 222.186.175.148 port 20616 ssh2
...
2020-07-04 21:13:11
31.186.8.164 attackspambots
Automatic report - XMLRPC Attack
2020-07-04 20:53:43
46.38.145.253 attack
2020-07-04 14:36:56 dovecot_login authenticator failed for \(User\) \[46.38.145.253\]: 535 Incorrect authentication data \(set_id=sn@hosting1.no-server.de\)
2020-07-04 14:37:07 dovecot_login authenticator failed for \(User\) \[46.38.145.253\]: 535 Incorrect authentication data \(set_id=student10@hosting1.no-server.de\)
2020-07-04 14:37:08 dovecot_login authenticator failed for \(User\) \[46.38.145.253\]: 535 Incorrect authentication data \(set_id=student10@hosting1.no-server.de\)
2020-07-04 14:37:24 dovecot_login authenticator failed for \(User\) \[46.38.145.253\]: 535 Incorrect authentication data \(set_id=student10@hosting1.no-server.de\)
2020-07-04 14:37:40 dovecot_login authenticator failed for \(User\) \[46.38.145.253\]: 535 Incorrect authentication data \(set_id=student10@hosting1.no-server.de\)
...
2020-07-04 20:45:57
46.101.84.165 attackspam
Automatically reported by fail2ban report script (mx1)
2020-07-04 21:11:06
61.133.232.249 attackspam
Jul  4 14:14:06 rancher-0 sshd[126372]: Invalid user suporte from 61.133.232.249 port 46996
...
2020-07-04 20:41:07
45.55.156.19 attackbotsspam
2020-07-04T12:26:56.626158shield sshd\[11057\]: Invalid user shipping from 45.55.156.19 port 36660
2020-07-04T12:26:56.629932shield sshd\[11057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.156.19
2020-07-04T12:26:59.207790shield sshd\[11057\]: Failed password for invalid user shipping from 45.55.156.19 port 36660 ssh2
2020-07-04T12:30:07.528594shield sshd\[12747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.156.19  user=root
2020-07-04T12:30:09.659883shield sshd\[12747\]: Failed password for root from 45.55.156.19 port 33844 ssh2
2020-07-04 20:44:34
176.31.252.148 attackbots
2020-07-04T12:42:49.998002shield sshd\[20226\]: Invalid user oracle from 176.31.252.148 port 52064
2020-07-04T12:42:50.001613shield sshd\[20226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=infra01.linalis.com
2020-07-04T12:42:51.416738shield sshd\[20226\]: Failed password for invalid user oracle from 176.31.252.148 port 52064 ssh2
2020-07-04T12:46:06.575903shield sshd\[22620\]: Invalid user sasha from 176.31.252.148 port 51929
2020-07-04T12:46:06.579831shield sshd\[22620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=infra01.linalis.com
2020-07-04 20:57:43
27.214.220.27 attack
Jul  4 14:13:48 pve1 sshd[3372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.214.220.27 
Jul  4 14:13:50 pve1 sshd[3372]: Failed password for invalid user hb from 27.214.220.27 port 57042 ssh2
...
2020-07-04 20:59:43
190.103.181.11 attack
2020-07-04T15:43:12.470484mail.standpoint.com.ua sshd[9221]: Invalid user mcf from 190.103.181.11 port 33567
2020-07-04T15:43:12.473051mail.standpoint.com.ua sshd[9221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.103.181.11
2020-07-04T15:43:12.470484mail.standpoint.com.ua sshd[9221]: Invalid user mcf from 190.103.181.11 port 33567
2020-07-04T15:43:14.373337mail.standpoint.com.ua sshd[9221]: Failed password for invalid user mcf from 190.103.181.11 port 33567 ssh2
2020-07-04T15:46:38.396441mail.standpoint.com.ua sshd[9758]: Invalid user mv from 190.103.181.11 port 60853
...
2020-07-04 21:14:02
178.128.72.84 attack
Jul  4 12:48:24 plex-server sshd[81834]: Invalid user zv from 178.128.72.84 port 39972
Jul  4 12:48:24 plex-server sshd[81834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.72.84 
Jul  4 12:48:24 plex-server sshd[81834]: Invalid user zv from 178.128.72.84 port 39972
Jul  4 12:48:25 plex-server sshd[81834]: Failed password for invalid user zv from 178.128.72.84 port 39972 ssh2
Jul  4 12:51:25 plex-server sshd[82093]: Invalid user ucpss from 178.128.72.84 port 37510
...
2020-07-04 20:54:49
210.113.7.61 attack
$f2bV_matches
2020-07-04 21:06:04

Recently Reported IPs

104.22.4.151 104.22.4.127 104.22.4.152 104.22.4.136
104.22.4.148 104.22.4.156 104.22.4.16 104.22.4.160
104.22.4.172 104.22.4.177 104.22.4.170 104.22.4.178
104.22.4.173 104.22.4.165 104.22.4.189 104.22.4.182
104.22.4.183 104.22.4.19 104.22.4.179 104.22.4.191