Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.45.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.45.196.			IN	A

;; AUTHORITY SECTION:
.			206	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:35:55 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 196.45.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.45.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.156.199.46 attack
WEB_SERVER 403 Forbidden
2019-11-06 01:30:40
46.229.173.68 attackspambots
WEB_SERVER 403 Forbidden
2019-11-06 01:53:32
175.211.116.226 attack
Automatic report - Banned IP Access
2019-11-06 01:43:53
211.110.140.200 attack
Nov  5 22:51:22 areeb-Workstation sshd[28696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.110.140.200
Nov  5 22:51:23 areeb-Workstation sshd[28696]: Failed password for invalid user ftpadmin from 211.110.140.200 port 36222 ssh2
...
2019-11-06 01:26:34
36.233.89.87 attack
Telnet Server BruteForce Attack
2019-11-06 01:58:23
123.31.32.150 attackbots
Nov  5 07:25:12 eddieflores sshd\[19522\]: Invalid user art from 123.31.32.150
Nov  5 07:25:12 eddieflores sshd\[19522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150
Nov  5 07:25:14 eddieflores sshd\[19522\]: Failed password for invalid user art from 123.31.32.150 port 48644 ssh2
Nov  5 07:29:48 eddieflores sshd\[19851\]: Invalid user admin1 from 123.31.32.150
Nov  5 07:29:48 eddieflores sshd\[19851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150
2019-11-06 01:33:44
49.235.107.14 attackspambots
Nov  5 15:33:06 eventyay sshd[1344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.107.14
Nov  5 15:33:08 eventyay sshd[1344]: Failed password for invalid user 1qaz@Wsx@ from 49.235.107.14 port 60225 ssh2
Nov  5 15:37:53 eventyay sshd[1377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.107.14
...
2019-11-06 01:38:02
88.255.217.70 attackspambots
Nov  5 15:36:55 mail postfix/smtps/smtpd[9420]: warning: unknown[88.255.217.70]: SASL PLAIN authentication failed: 
Nov  5 15:37:01 mail postfix/smtps/smtpd[9420]: warning: unknown[88.255.217.70]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  5 15:37:08 mail postfix/smtps/smtpd[13184]: warning: unknown[88.255.217.70]: SASL PLAIN authentication failed:
2019-11-06 01:31:19
101.78.209.39 attackspam
Nov  5 23:22:11 webhost01 sshd[6229]: Failed password for root from 101.78.209.39 port 33475 ssh2
...
2019-11-06 02:01:00
50.50.110.110 attack
WEB_SERVER 403 Forbidden
2019-11-06 01:17:52
164.132.98.75 attackspambots
Nov  5 21:28:44 lcl-usvr-02 sshd[18897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75  user=root
Nov  5 21:28:46 lcl-usvr-02 sshd[18897]: Failed password for root from 164.132.98.75 port 39092 ssh2
Nov  5 21:33:11 lcl-usvr-02 sshd[19958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75  user=root
Nov  5 21:33:12 lcl-usvr-02 sshd[19958]: Failed password for root from 164.132.98.75 port 57822 ssh2
Nov  5 21:36:59 lcl-usvr-02 sshd[20776]: Invalid user radio from 164.132.98.75 port 48322
...
2019-11-06 02:03:47
188.165.223.93 attackspambots
$f2bV_matches
2019-11-06 01:20:53
39.104.75.219 attackspam
WEB_SERVER 403 Forbidden
2019-11-06 01:35:38
92.118.161.53 attackbotsspam
" "
2019-11-06 01:53:17
45.136.110.42 attackbots
port scan
 2025
 2035
 2050
 2060
 2070
 2075
 2085
 2347
 2348
last 10 hours
2019-11-06 01:34:41

Recently Reported IPs

104.22.45.178 104.22.45.184 104.22.45.202 104.22.45.238
104.22.45.188 104.22.45.213 104.22.45.173 104.22.45.253
104.22.45.254 104.22.45.68 104.22.45.73 104.22.45.99
104.22.46.103 104.22.45.95 104.22.46.116 104.22.45.81
104.22.46.104 104.22.45.80 104.22.45.78 104.22.46.127