Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.22.55.74 attack
test
2023-11-03 07:27:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.5.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.5.18.			IN	A

;; AUTHORITY SECTION:
.			328	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 18:50:35 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 18.5.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.5.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.67 attackbotsspam
Jan  3 00:05:26 v22018053744266470 sshd[17276]: Failed password for root from 49.88.112.67 port 58831 ssh2
Jan  3 00:06:21 v22018053744266470 sshd[17336]: Failed password for root from 49.88.112.67 port 36673 ssh2
...
2020-01-03 07:18:53
120.52.121.86 attackspam
Automatic report - Banned IP Access
2020-01-03 07:11:27
112.85.42.174 attackbotsspam
Jan  3 00:07:13 vps647732 sshd[32626]: Failed password for root from 112.85.42.174 port 7489 ssh2
Jan  3 00:07:25 vps647732 sshd[32626]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 7489 ssh2 [preauth]
...
2020-01-03 07:09:03
61.19.69.18 attackbotsspam
1577976549 - 01/02/2020 15:49:09 Host: 61.19.69.18/61.19.69.18 Port: 445 TCP Blocked
2020-01-03 06:49:47
78.128.112.114 attackbots
Port scan: Attack repeated for 24 hours
2020-01-03 07:07:32
123.232.113.54 attackspam
Port scan: Attack repeated for 24 hours
2020-01-03 06:43:49
94.191.40.39 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-01-03 07:17:40
36.155.113.218 attackbots
Automatic report - Banned IP Access
2020-01-03 06:58:31
128.199.132.137 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-01-03 07:14:44
51.254.140.235 attack
5x Failed Password
2020-01-03 07:14:04
64.140.200.40 attackbotsspam
Automatic report - XMLRPC Attack
2020-01-03 06:52:15
51.77.109.98 attackspam
Jan  2 23:27:16 mout sshd[3596]: Invalid user dwg from 51.77.109.98 port 52556
2020-01-03 06:43:03
92.222.89.7 attack
Jan  2 23:53:02 mout sshd[6188]: Invalid user pcap from 92.222.89.7 port 54226
Jan  2 23:53:04 mout sshd[6188]: Failed password for invalid user pcap from 92.222.89.7 port 54226 ssh2
Jan  3 00:07:15 mout sshd[7613]: Invalid user ftpuser from 92.222.89.7 port 58878
2020-01-03 07:17:19
54.37.19.148 attackbots
Jan  2 18:07:03 mail sshd\[6456\]: Invalid user pokemon from 54.37.19.148
Jan  2 18:07:03 mail sshd\[6456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.19.148
...
2020-01-03 07:22:03
181.50.102.55 attackbotsspam
Jan  3 00:12:11 vmanager6029 sshd\[18498\]: Invalid user admin1 from 181.50.102.55 port 5870
Jan  3 00:12:11 vmanager6029 sshd\[18498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.50.102.55
Jan  3 00:12:13 vmanager6029 sshd\[18498\]: Failed password for invalid user admin1 from 181.50.102.55 port 5870 ssh2
2020-01-03 07:23:32

Recently Reported IPs

104.22.5.169 104.22.5.213 104.22.5.253 104.22.5.31
104.22.5.46 104.22.50.111 104.22.50.147 104.22.50.166
104.22.50.178 104.22.51.111 104.22.51.147 104.22.51.166
104.22.51.178 104.22.52.116 104.22.52.164 104.22.52.175
104.22.52.178 104.22.52.237 154.69.148.19 104.22.52.254