Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.49.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.49.185.			IN	A

;; AUTHORITY SECTION:
.			49	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:37:04 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 185.49.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 185.49.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.214.17.98 attack
08/04/2020-05:24:42.525543 113.214.17.98 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-08-04 21:04:48
51.254.120.159 attack
Aug  4 12:21:21 vm1 sshd[446]: Failed password for root from 51.254.120.159 port 37629 ssh2
...
2020-08-04 21:01:31
112.200.98.190 attackbotsspam
1596533085 - 08/04/2020 11:24:45 Host: 112.200.98.190/112.200.98.190 Port: 445 TCP Blocked
2020-08-04 21:00:59
218.92.0.133 attackbotsspam
Aug  4 15:02:43 piServer sshd[14247]: Failed password for root from 218.92.0.133 port 27632 ssh2
Aug  4 15:02:50 piServer sshd[14247]: Failed password for root from 218.92.0.133 port 27632 ssh2
Aug  4 15:02:54 piServer sshd[14247]: Failed password for root from 218.92.0.133 port 27632 ssh2
Aug  4 15:02:58 piServer sshd[14247]: Failed password for root from 218.92.0.133 port 27632 ssh2
...
2020-08-04 21:07:23
188.169.45.247 attack
Unauthorized connection attempt detected from IP address 188.169.45.247 to port 23
2020-08-04 21:11:29
210.180.0.142 attack
Aug  4 14:30:36 mout sshd[16867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.180.0.142  user=root
Aug  4 14:30:39 mout sshd[16867]: Failed password for root from 210.180.0.142 port 41626 ssh2
2020-08-04 21:14:50
218.92.0.216 attack
Aug  4 15:23:14 eventyay sshd[23195]: Failed password for root from 218.92.0.216 port 11921 ssh2
Aug  4 15:23:28 eventyay sshd[23208]: Failed password for root from 218.92.0.216 port 50938 ssh2
...
2020-08-04 21:26:20
39.109.127.91 attackbots
Lines containing failures of 39.109.127.91 (max 1000)
Aug  3 08:48:00 archiv sshd[22519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.109.127.91  user=r.r
Aug  3 08:48:02 archiv sshd[22519]: Failed password for r.r from 39.109.127.91 port 38160 ssh2
Aug  3 08:48:03 archiv sshd[22519]: Received disconnect from 39.109.127.91 port 38160:11: Bye Bye [preauth]
Aug  3 08:48:03 archiv sshd[22519]: Disconnected from 39.109.127.91 port 38160 [preauth]
Aug  3 08:57:31 archiv sshd[22639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.109.127.91  user=r.r
Aug  3 08:57:33 archiv sshd[22639]: Failed password for r.r from 39.109.127.91 port 46836 ssh2
Aug  3 08:57:33 archiv sshd[22639]: Received disconnect from 39.109.127.91 port 46836:11: Bye Bye [preauth]
Aug  3 08:57:33 archiv sshd[22639]: Disconnected from 39.109.127.91 port 46836 [preauth]
Aug  3 09:01:53 archiv sshd[22695]: pam_unix(sshd:a........
------------------------------
2020-08-04 20:57:04
107.189.11.160 attackspambots
Aug  4 09:37:48 firewall sshd[18523]: Invalid user vagrant from 107.189.11.160
Aug  4 09:37:48 firewall sshd[18519]: Invalid user test from 107.189.11.160
Aug  4 09:37:48 firewall sshd[18521]: Invalid user oracle from 107.189.11.160
...
2020-08-04 20:57:43
58.102.31.36 attackspam
Aug  4 11:20:20 sip sshd[1186479]: Failed password for root from 58.102.31.36 port 57850 ssh2
Aug  4 11:24:58 sip sshd[1186524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.102.31.36  user=root
Aug  4 11:25:00 sip sshd[1186524]: Failed password for root from 58.102.31.36 port 37414 ssh2
...
2020-08-04 20:51:01
106.12.68.244 attackbotsspam
Aug  4 07:25:01 vps46666688 sshd[6008]: Failed password for root from 106.12.68.244 port 33214 ssh2
...
2020-08-04 20:54:22
88.249.44.230 attack
1596533076 - 08/04/2020 11:24:36 Host: 88.249.44.230/88.249.44.230 Port: 445 TCP Blocked
2020-08-04 21:09:32
159.89.130.178 attack
leo_www
2020-08-04 20:39:53
177.134.213.182 attackspambots
Lines containing failures of 177.134.213.182
Aug  3 09:39:10 ghostnameioc sshd[25601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.213.182  user=r.r
Aug  3 09:39:11 ghostnameioc sshd[25601]: Failed password for r.r from 177.134.213.182 port 59078 ssh2
Aug  3 09:39:12 ghostnameioc sshd[25601]: Received disconnect from 177.134.213.182 port 59078:11: Bye Bye [preauth]
Aug  3 09:39:12 ghostnameioc sshd[25601]: Disconnected from authenticating user r.r 177.134.213.182 port 59078 [preauth]
Aug  3 09:46:01 ghostnameioc sshd[25692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.213.182  user=r.r
Aug  3 09:46:03 ghostnameioc sshd[25692]: Failed password for r.r from 177.134.213.182 port 53532 ssh2
Aug  3 09:46:05 ghostnameioc sshd[25692]: Received disconnect from 177.134.213.182 port 53532:11: Bye Bye [preauth]
Aug  3 09:46:05 ghostnameioc sshd[25692]: Disconnected from authentic........
------------------------------
2020-08-04 21:02:00
117.89.12.194 attackbotsspam
2020-08-04T08:25:15.717286devel sshd[25791]: Failed password for root from 117.89.12.194 port 58209 ssh2
2020-08-04T08:27:24.946469devel sshd[26064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.89.12.194  user=root
2020-08-04T08:27:26.705324devel sshd[26064]: Failed password for root from 117.89.12.194 port 39580 ssh2
2020-08-04 21:18:30

Recently Reported IPs

104.22.49.168 104.22.49.140 104.22.49.186 104.22.49.193
104.22.49.200 104.22.49.164 104.22.49.207 104.22.49.212
104.22.49.208 104.22.49.220 104.22.49.223 104.22.49.216
104.22.49.222 104.22.49.230 104.22.49.236 104.22.49.238
104.22.49.244 104.22.49.245 104.22.49.237 104.22.49.251