Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.45.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6358
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.45.146.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:35:51 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 146.45.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 146.45.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.234.23.78 attack
Sep  4 14:33:03 saschabauer sshd[3893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.23.78
Sep  4 14:33:05 saschabauer sshd[3893]: Failed password for invalid user support from 62.234.23.78 port 10826 ssh2
2019-09-04 21:03:06
185.254.122.140 attack
09/04/2019-08:42:56.295932 185.254.122.140 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-04 21:06:05
187.32.125.210 attack
SMB Server BruteForce Attack
2019-09-04 21:39:45
144.217.161.22 attack
xmlrpc attack
2019-09-04 21:47:54
153.228.158.177 attackbotsspam
Sep  4 03:06:03 php2 sshd\[23874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=p817177-ipngn4201hiraide.tochigi.ocn.ne.jp  user=root
Sep  4 03:06:05 php2 sshd\[23874\]: Failed password for root from 153.228.158.177 port 56253 ssh2
Sep  4 03:11:55 php2 sshd\[24491\]: Invalid user test from 153.228.158.177
Sep  4 03:11:55 php2 sshd\[24491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=p817177-ipngn4201hiraide.tochigi.ocn.ne.jp
Sep  4 03:11:57 php2 sshd\[24491\]: Failed password for invalid user test from 153.228.158.177 port 50511 ssh2
2019-09-04 21:16:16
46.101.47.26 attack
WordPress login Brute force / Web App Attack on client site.
2019-09-04 21:43:19
118.25.97.93 attackspam
Sep  4 03:06:18 eddieflores sshd\[13589\]: Invalid user guillermo from 118.25.97.93
Sep  4 03:06:18 eddieflores sshd\[13589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.97.93
Sep  4 03:06:20 eddieflores sshd\[13589\]: Failed password for invalid user guillermo from 118.25.97.93 port 36886 ssh2
Sep  4 03:11:47 eddieflores sshd\[14115\]: Invalid user angler from 118.25.97.93
Sep  4 03:11:47 eddieflores sshd\[14115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.97.93
2019-09-04 21:27:59
112.200.180.1 attack
SMB Server BruteForce Attack
2019-09-04 21:14:32
23.129.64.189 attackbots
vulcan
2019-09-04 21:45:49
118.89.48.251 attack
Sep  4 15:05:46 minden010 sshd[32170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.48.251
Sep  4 15:05:48 minden010 sshd[32170]: Failed password for invalid user student from 118.89.48.251 port 50186 ssh2
Sep  4 15:11:33 minden010 sshd[5053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.48.251
...
2019-09-04 21:44:45
218.98.26.172 attackspambots
$f2bV_matches
2019-09-04 21:36:57
185.153.196.191 attack
Multiport scan : 9 ports scanned 1047 1048 1054 1072 6668 7005 13000 19000 22000
2019-09-04 21:11:31
79.134.234.247 attackspam
Sep  4 15:11:46 rotator sshd\[21438\]: Failed password for root from 79.134.234.247 port 33744 ssh2Sep  4 15:11:49 rotator sshd\[21438\]: Failed password for root from 79.134.234.247 port 33744 ssh2Sep  4 15:11:51 rotator sshd\[21438\]: Failed password for root from 79.134.234.247 port 33744 ssh2Sep  4 15:11:54 rotator sshd\[21438\]: Failed password for root from 79.134.234.247 port 33744 ssh2Sep  4 15:11:56 rotator sshd\[21438\]: Failed password for root from 79.134.234.247 port 33744 ssh2Sep  4 15:11:58 rotator sshd\[21438\]: Failed password for root from 79.134.234.247 port 33744 ssh2
...
2019-09-04 21:15:17
101.89.109.136 attackspambots
04.09.2019 08:25:30 SMTP access blocked by firewall
2019-09-04 21:05:11
31.154.16.105 attackbotsspam
Sep  4 03:07:03 aiointranet sshd\[10421\]: Invalid user a1s2d3f4 from 31.154.16.105
Sep  4 03:07:03 aiointranet sshd\[10421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.154.16.105
Sep  4 03:07:05 aiointranet sshd\[10421\]: Failed password for invalid user a1s2d3f4 from 31.154.16.105 port 35472 ssh2
Sep  4 03:11:55 aiointranet sshd\[10889\]: Invalid user julie123 from 31.154.16.105
Sep  4 03:11:55 aiointranet sshd\[10889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.154.16.105
2019-09-04 21:17:39

Recently Reported IPs

104.22.45.136 104.22.45.126 104.22.45.131 104.22.45.155
104.22.45.167 104.22.45.206 104.22.45.189 104.22.45.178
104.22.45.196 104.22.45.184 104.22.45.202 104.22.45.238
104.22.45.188 104.22.45.213 104.22.45.173 104.22.45.253
104.22.45.254 104.22.45.68 104.22.45.73 104.22.45.99