Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.43.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.43.136.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:35:19 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 136.43.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.43.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.165.11.182 attack
Unauthorized connection attempt from IP address 118.165.11.182 on Port 445(SMB)
2020-04-13 17:01:23
40.117.178.219 attackspambots
Apr 13 02:28:53 kmh-wmh-003-nbg03 sshd[13793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.178.219  user=r.r
Apr 13 02:28:54 kmh-wmh-003-nbg03 sshd[13793]: Failed password for r.r from 40.117.178.219 port 37706 ssh2
Apr 13 02:28:54 kmh-wmh-003-nbg03 sshd[13793]: Received disconnect from 40.117.178.219 port 37706:11: Bye Bye [preauth]
Apr 13 02:28:54 kmh-wmh-003-nbg03 sshd[13793]: Disconnected from 40.117.178.219 port 37706 [preauth]
Apr 13 02:50:01 kmh-wmh-003-nbg03 sshd[16078]: Connection closed by 40.117.178.219 port 33300 [preauth]
Apr 13 03:00:44 kmh-wmh-003-nbg03 sshd[17889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.178.219  user=r.r
Apr 13 03:00:47 kmh-wmh-003-nbg03 sshd[17889]: Failed password for r.r from 40.117.178.219 port 40924 ssh2
Apr 13 03:00:47 kmh-wmh-003-nbg03 sshd[17889]: Received disconnect from 40.117.178.219 port 40924:11: Bye Bye [preauth]
Apr 1........
-------------------------------
2020-04-13 17:03:39
185.156.73.65 attackbotsspam
04/13/2020-04:45:59.198453 185.156.73.65 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-13 16:53:52
200.13.195.70 attack
2020-04-13T06:08:17.314298abusebot-7.cloudsearch.cf sshd[17867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.13.195.70  user=root
2020-04-13T06:08:18.991489abusebot-7.cloudsearch.cf sshd[17867]: Failed password for root from 200.13.195.70 port 51942 ssh2
2020-04-13T06:12:20.130208abusebot-7.cloudsearch.cf sshd[18178]: Invalid user saturnio from 200.13.195.70 port 59768
2020-04-13T06:12:20.134141abusebot-7.cloudsearch.cf sshd[18178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.13.195.70
2020-04-13T06:12:20.130208abusebot-7.cloudsearch.cf sshd[18178]: Invalid user saturnio from 200.13.195.70 port 59768
2020-04-13T06:12:21.836510abusebot-7.cloudsearch.cf sshd[18178]: Failed password for invalid user saturnio from 200.13.195.70 port 59768 ssh2
2020-04-13T06:16:18.096402abusebot-7.cloudsearch.cf sshd[18427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2
...
2020-04-13 16:37:58
117.69.30.4 attackspam
Apr 13 06:53:37 elektron postfix/smtpd\[12073\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.4\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.4\]\; from=\ to=\ proto=ESMTP helo=\
Apr 13 06:54:10 elektron postfix/smtpd\[12822\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.4\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.4\]\; from=\ to=\ proto=ESMTP helo=\
Apr 13 06:54:47 elektron postfix/smtpd\[12822\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.4\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.4\]\; from=\ to=\ proto=ESMTP helo=\
Apr 13 06:55:20 elektron postfix/smtpd\[12073\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.4\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.4\]\; from=\ to=\ proto=ESMTP helo=\
2020-04-13 16:42:14
14.116.188.151 attackspam
Apr 13 05:47:32 tuxlinux sshd[19544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.188.151  user=root
Apr 13 05:47:34 tuxlinux sshd[19544]: Failed password for root from 14.116.188.151 port 52164 ssh2
Apr 13 05:47:32 tuxlinux sshd[19544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.188.151  user=root
Apr 13 05:47:34 tuxlinux sshd[19544]: Failed password for root from 14.116.188.151 port 52164 ssh2
Apr 13 06:04:33 tuxlinux sshd[19867]: Invalid user anonymous from 14.116.188.151 port 41212
Apr 13 06:04:33 tuxlinux sshd[19867]: Invalid user anonymous from 14.116.188.151 port 41212
Apr 13 06:04:33 tuxlinux sshd[19867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.188.151 
...
2020-04-13 16:46:27
222.41.193.211 attackbots
$f2bV_matches
2020-04-13 16:32:42
123.213.118.68 attack
20 attempts against mh-ssh on cloud
2020-04-13 16:40:24
222.186.30.218 attackbots
Apr 13 11:03:12 minden010 sshd[2040]: Failed password for root from 222.186.30.218 port 43959 ssh2
Apr 13 11:03:15 minden010 sshd[2040]: Failed password for root from 222.186.30.218 port 43959 ssh2
Apr 13 11:03:17 minden010 sshd[2040]: Failed password for root from 222.186.30.218 port 43959 ssh2
...
2020-04-13 17:08:13
35.200.206.240 attackspambots
$f2bV_matches
2020-04-13 16:46:13
113.210.102.204 attack
Unauthorized connection attempt from IP address 113.210.102.204 on Port 445(SMB)
2020-04-13 17:05:35
200.169.6.202 attackbots
Automatic report - SSH Brute-Force Attack
2020-04-13 16:53:25
62.234.92.111 attack
SSH auth scanning - multiple failed logins
2020-04-13 16:52:39
122.224.220.140 attack
Fail2Ban Ban Triggered
2020-04-13 16:38:49
117.5.111.109 attack
Unauthorized connection attempt from IP address 117.5.111.109 on Port 445(SMB)
2020-04-13 17:02:29

Recently Reported IPs

104.22.43.158 104.22.43.175 104.22.43.172 104.22.43.171
104.22.43.174 104.22.43.204 104.22.43.195 104.22.43.181
104.22.43.210 104.22.43.212 104.22.43.218 104.22.43.221
104.22.43.222 104.22.43.224 104.22.43.238 104.22.43.234
104.22.43.219 104.22.43.240 104.22.43.243 104.22.43.245