Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.44.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.44.116.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:35:36 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 116.44.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 116.44.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.95.124.230 attackbotsspam
ssh failed login
2019-07-31 11:34:34
35.246.229.175 attackspambots
19/7/30@22:32:53: FAIL: IoT-SSH address from=35.246.229.175
...
2019-07-31 11:15:51
35.224.59.213 attackbots
20 attempts against mh-ssh on comet.magehost.pro
2019-07-31 10:55:45
118.24.81.93 attackbots
Automatic report - Banned IP Access
2019-07-31 11:20:27
201.177.128.220 attack
port 23 attempt blocked
2019-07-31 11:25:03
134.119.221.7 attackbotsspam
\[2019-07-30 22:39:19\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-30T22:39:19.101-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="50046903433972",SessionID="0x7ff4d0411568",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/58673",ACLName="no_extension_match"
\[2019-07-30 22:42:07\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-30T22:42:07.637-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="60046903433972",SessionID="0x7ff4d0592ee8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/61219",ACLName="no_extension_match"
\[2019-07-30 22:45:01\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-30T22:45:00.999-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="70046903433972",SessionID="0x7ff4d0411568",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/57920",ACLName="no_extens
2019-07-31 10:56:37
198.108.67.82 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-07-31 11:26:45
123.113.251.36 attack
Jul 31 00:35:24 host proftpd\[554\]: 0.0.0.0 \(123.113.251.36\[123.113.251.36\]\) - USER anonymous: no such user found from 123.113.251.36 \[123.113.251.36\] to 62.210.146.38:21
...
2019-07-31 11:11:24
222.94.163.36 attackspam
SASL Brute Force
2019-07-31 11:28:53
118.163.193.82 attackbotsspam
ssh bruteforce or scan
...
2019-07-31 11:07:28
162.243.142.193 attackspambots
Jul 31 04:40:34 lnxweb62 sshd[3384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.142.193
Jul 31 04:40:34 lnxweb62 sshd[3384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.142.193
2019-07-31 10:46:08
200.100.20.123 attackspambots
1564526157 - 07/31/2019 05:35:57 Host: 200-100-20-123.dial-up.telesp.net.br/200.100.20.123 Port: 23 TCP Blocked
...
2019-07-31 10:55:14
200.107.154.47 attackspam
Jul 31 04:06:10 localhost sshd\[63327\]: Invalid user gs from 200.107.154.47 port 20046
Jul 31 04:06:10 localhost sshd\[63327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.47
...
2019-07-31 11:14:32
190.41.173.219 attackbotsspam
Jul 31 00:35:15 [munged] sshd[20271]: Invalid user felicia from 190.41.173.219 port 34810
Jul 31 00:35:15 [munged] sshd[20271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.41.173.219
2019-07-31 11:13:08
5.79.16.40 attackspam
Jul 31 00:25:27 XXXXXX sshd[10715]: Invalid user lionel from 5.79.16.40 port 58192
2019-07-31 11:07:08

Recently Reported IPs

104.22.43.90 104.22.43.97 104.22.44.108 104.22.44.105
104.22.44.128 104.22.44.129 104.22.44.146 104.22.44.144
104.22.44.136 104.22.44.131 104.22.44.178 104.22.44.167
104.22.44.155 104.22.44.173 104.22.44.189 104.22.44.196
104.22.44.184 104.22.44.188 104.22.44.202 104.22.44.206