Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.49.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26484
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.49.157.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:37:03 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 157.49.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.49.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.22.251.76 attackspam
Sep 10 08:34:49 root sshd[29385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.251.76 
...
2020-09-10 17:18:10
189.134.23.135 attackbotsspam
2020-09-09 18:50:11 wonderland sshd[3997]: Invalid user DUP from 189.134.23.135 port 53748
2020-09-10 17:07:12
161.97.99.51 attackspambots
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2020-09-10 17:18:28
188.65.106.130 attackbotsspam
20/9/9@13:54:41: FAIL: Alarm-Network address from=188.65.106.130
...
2020-09-10 17:21:27
85.143.216.214 attackbotsspam
2020-09-09T18:46:21.384363n23.at sshd[3428976]: Failed password for root from 85.143.216.214 port 56778 ssh2
2020-09-09T18:50:08.622124n23.at sshd[3432294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.143.216.214  user=root
2020-09-09T18:50:10.253139n23.at sshd[3432294]: Failed password for root from 85.143.216.214 port 34112 ssh2
...
2020-09-10 17:09:50
5.188.86.178 attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-10T09:22:43Z
2020-09-10 17:29:11
186.53.185.100 attackbots
Spam
2020-09-10 17:34:54
128.199.190.186 attackspam
firewall-block, port(s): 1081/tcp
2020-09-10 17:07:25
5.188.86.165 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-10T08:02:29Z
2020-09-10 17:40:22
165.227.193.157 attackspambots
Sep 10 09:43:39 root sshd[4010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.193.157 
...
2020-09-10 17:16:54
156.96.44.214 attackspambots
Brute forcing email accounts
2020-09-10 17:37:10
81.170.239.2 attack
CF RAY ID: 5d0401cec973dac0 IP Class: noRecord URI: /wp-login.php
2020-09-10 17:15:09
2607:5300:203:d86:: attackbots
xmlrpc attack
2020-09-10 17:42:32
106.12.208.99 attackspambots
Sep  7 21:53:59 v26 sshd[27516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.99  user=r.r
Sep  7 21:54:01 v26 sshd[27516]: Failed password for r.r from 106.12.208.99 port 42106 ssh2
Sep  7 21:54:01 v26 sshd[27516]: Received disconnect from 106.12.208.99 port 42106:11: Bye Bye [preauth]
Sep  7 21:54:01 v26 sshd[27516]: Disconnected from 106.12.208.99 port 42106 [preauth]
Sep  7 22:11:10 v26 sshd[29162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.99  user=r.r
Sep  7 22:11:12 v26 sshd[29162]: Failed password for r.r from 106.12.208.99 port 45240 ssh2
Sep  7 22:11:12 v26 sshd[29162]: Received disconnect from 106.12.208.99 port 45240:11: Bye Bye [preauth]
Sep  7 22:11:12 v26 sshd[29162]: Disconnected from 106.12.208.99 port 45240 [preauth]
Sep  7 22:14:05 v26 sshd[29528]: Invalid user januario from 106.12.208.99 port 57512
Sep  7 22:14:05 v26 sshd[29528]: pam_unix(s........
-------------------------------
2020-09-10 17:24:17
118.174.211.220 attackspambots
Sep 10 10:36:31 ip106 sshd[10255]: Failed password for root from 118.174.211.220 port 41894 ssh2
...
2020-09-10 17:13:15

Recently Reported IPs

104.22.49.154 104.22.49.156 104.22.49.169 104.22.49.165
104.22.49.168 104.22.49.185 104.22.49.140 104.22.49.186
104.22.49.193 104.22.49.200 104.22.49.164 104.22.49.207
104.22.49.212 104.22.49.208 104.22.49.220 104.22.49.223
104.22.49.216 104.22.49.222 104.22.49.230 104.22.49.236