Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.44.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.44.121.			IN	A

;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:24:10 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 121.44.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.44.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.176.58.76 attackspambots
Mar 26 00:39:06 124388 sshd[7459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.176.58.76
Mar 26 00:39:06 124388 sshd[7459]: Invalid user postgres from 178.176.58.76 port 41180
Mar 26 00:39:08 124388 sshd[7459]: Failed password for invalid user postgres from 178.176.58.76 port 41180 ssh2
Mar 26 00:41:02 124388 sshd[7487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.176.58.76  user=uucp
Mar 26 00:41:04 124388 sshd[7487]: Failed password for uucp from 178.176.58.76 port 34950 ssh2
2020-03-26 09:17:56
137.117.81.135 attack
Invalid user nesta from 137.117.81.135 port 54470
2020-03-26 09:47:45
87.5.207.195 attackbotsspam
firewall-block, port(s): 80/tcp
2020-03-26 09:56:59
181.65.164.179 attack
SSH Brute-Force Attack
2020-03-26 10:03:46
51.38.185.121 attackbots
SSH brute-force attempt
2020-03-26 10:05:40
182.16.103.34 attackspam
2020-03-25T19:03:00.036984linuxbox-skyline sshd[30625]: Invalid user f3 from 182.16.103.34 port 33712
...
2020-03-26 09:32:55
179.124.34.8 attack
$f2bV_matches
2020-03-26 09:21:07
123.31.27.102 attackbotsspam
Brute force SMTP login attempted.
...
2020-03-26 09:43:10
59.41.117.218 attackbotsspam
Mar 26 01:45:19 vps647732 sshd[18290]: Failed password for nobody from 59.41.117.218 port 39020 ssh2
...
2020-03-26 09:51:04
58.228.63.224 attackbotsspam
Mar 25 16:38:58 shell sshd[20804]: Connection from 58.228.63.224 port 40891 on 66.146.192.9 port 22
Mar 25 16:38:58 shell sshd[20805]: Connection from 58.228.63.224 port 38638 on 66.146.192.9 port 22
Mar 25 16:39:03 shell sshd[20805]: Failed password for invalid user pi from 58.228.63.224 port 38638 ssh2
Mar 25 16:39:03 shell sshd[20804]: Failed password for invalid user pi from 58.228.63.224 port 40891 ssh2
Mar 25 16:39:04 shell sshd[20805]: Connection closed by 58.228.63.224 [preauth]
Mar 25 16:39:04 shell sshd[20804]: Connection closed by 58.228.63.224 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=58.228.63.224
2020-03-26 09:32:38
213.32.88.138 attack
Invalid user b from 213.32.88.138 port 46396
2020-03-26 10:04:50
106.13.35.87 attackspam
Mar 26 00:22:57  sshd\[24307\]: Invalid user rofl from 106.13.35.87Mar 26 00:22:59  sshd\[24307\]: Failed password for invalid user rofl from 106.13.35.87 port 40778 ssh2
...
2020-03-26 09:23:28
180.76.134.246 attackspambots
$f2bV_matches
2020-03-26 09:32:03
150.109.72.230 attack
Mar 26 01:52:37 markkoudstaal sshd[28953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.72.230
Mar 26 01:52:39 markkoudstaal sshd[28953]: Failed password for invalid user wwwadm from 150.109.72.230 port 54848 ssh2
Mar 26 01:55:17 markkoudstaal sshd[29330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.72.230
2020-03-26 09:34:22
198.108.66.237 attack
Mar 26 02:13:40 debian-2gb-nbg1-2 kernel: \[7444297.519855\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.66.237 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=20206 PROTO=TCP SPT=40571 DPT=11184 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-26 09:37:21

Recently Reported IPs

104.22.43.169 104.22.44.240 104.22.45.121 104.22.44.207
104.22.45.195 104.22.45.143 104.22.45.207 104.22.44.252
104.22.45.186 104.22.45.252 13.226.31.109 104.22.46.163
104.22.46.233 104.22.45.240 104.22.46.94 104.22.47.163
104.22.47.70 104.22.47.94 104.22.46.70 104.22.48.125