Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.52.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.52.201.			IN	A

;; AUTHORITY SECTION:
.			478	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:38:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 201.52.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.52.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.148.119.94 attack
Mar 10 03:11:30 odroid64 sshd\[12628\]: Invalid user admin from 201.148.119.94
Mar 10 03:11:30 odroid64 sshd\[12628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.148.119.94
Mar 10 03:11:32 odroid64 sshd\[12628\]: Failed password for invalid user admin from 201.148.119.94 port 55262 ssh2
...
2019-10-18 07:42:51
201.149.32.214 attackbotsspam
Jan 29 15:32:33 odroid64 sshd\[9383\]: User root from 201.149.32.214 not allowed because not listed in AllowUsers
Jan 29 15:32:33 odroid64 sshd\[9383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.32.214  user=root
Jan 29 15:32:35 odroid64 sshd\[9383\]: Failed password for invalid user root from 201.149.32.214 port 23048 ssh2
Feb 22 04:31:55 odroid64 sshd\[4750\]: Invalid user weblogic from 201.149.32.214
Feb 22 04:31:55 odroid64 sshd\[4750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.32.214
Feb 22 04:31:57 odroid64 sshd\[4750\]: Failed password for invalid user weblogic from 201.149.32.214 port 17510 ssh2
Jun  5 22:18:07 odroid64 sshd\[16623\]: User root from 201.149.32.214 not allowed because not listed in AllowUsers
Jun  5 22:18:07 odroid64 sshd\[16623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.32.214  user=root
Ju
...
2019-10-18 07:32:59
106.13.208.49 attackbotsspam
$f2bV_matches
2019-10-18 07:38:02
2604:a880:2:d0::1edc:2001 attack
WordPress wp-login brute force :: 2604:a880:2:d0::1edc:2001 0.048 BYPASS [18/Oct/2019:06:49:36  1100] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-18 07:27:29
222.186.173.238 attackspambots
Oct 17 19:32:25 xentho sshd[3459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Oct 17 19:32:27 xentho sshd[3459]: Failed password for root from 222.186.173.238 port 7828 ssh2
Oct 17 19:32:31 xentho sshd[3459]: Failed password for root from 222.186.173.238 port 7828 ssh2
Oct 17 19:32:25 xentho sshd[3459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Oct 17 19:32:27 xentho sshd[3459]: Failed password for root from 222.186.173.238 port 7828 ssh2
Oct 17 19:32:31 xentho sshd[3459]: Failed password for root from 222.186.173.238 port 7828 ssh2
Oct 17 19:32:25 xentho sshd[3459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Oct 17 19:32:27 xentho sshd[3459]: Failed password for root from 222.186.173.238 port 7828 ssh2
Oct 17 19:32:31 xentho sshd[3459]: Failed password for root from 222.1
...
2019-10-18 07:35:45
192.169.139.6 attackspam
WordPress wp-login brute force :: 192.169.139.6 0.044 BYPASS [18/Oct/2019:06:49:33  1100] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-18 07:29:26
159.65.77.254 attack
Invalid user laurent from 159.65.77.254 port 51634
2019-10-18 07:45:46
201.16.246.71 attack
Feb 23 07:14:36 odroid64 sshd\[18809\]: Invalid user user from 201.16.246.71
Feb 23 07:14:36 odroid64 sshd\[18809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.16.246.71
Feb 23 07:14:38 odroid64 sshd\[18809\]: Failed password for invalid user user from 201.16.246.71 port 45522 ssh2
Mar  5 18:48:04 odroid64 sshd\[16543\]: Invalid user od from 201.16.246.71
Mar  5 18:48:04 odroid64 sshd\[16543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.16.246.71
Mar  5 18:48:07 odroid64 sshd\[16543\]: Failed password for invalid user od from 201.16.246.71 port 43902 ssh2
Mar 15 03:08:03 odroid64 sshd\[3989\]: Invalid user nagios from 201.16.246.71
Mar 15 03:08:03 odroid64 sshd\[3989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.16.246.71
Mar 15 03:08:06 odroid64 sshd\[3989\]: Failed password for invalid user nagios from 201.16.246.71 port 45332 ssh
...
2019-10-18 07:12:46
178.20.55.16 attackbots
2019-10-17T19:49:40.662080abusebot.cloudsearch.cf sshd\[30541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=marcuse-1.nos-oignons.net  user=root
2019-10-18 07:23:27
157.100.234.45 attackspambots
Oct 17 12:12:37 php1 sshd\[9349\]: Invalid user P@\$\$w0rd from 157.100.234.45
Oct 17 12:12:37 php1 sshd\[9349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.100.234.45
Oct 17 12:12:39 php1 sshd\[9349\]: Failed password for invalid user P@\$\$w0rd from 157.100.234.45 port 56662 ssh2
Oct 17 12:17:09 php1 sshd\[10224\]: Invalid user rootme from 157.100.234.45
Oct 17 12:17:09 php1 sshd\[10224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.100.234.45
2019-10-18 07:11:36
94.23.208.211 attack
2019-10-17T20:29:38.430707shield sshd\[17129\]: Invalid user schedule from 94.23.208.211 port 57678
2019-10-17T20:29:38.435950shield sshd\[17129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns303460.ip-94-23-208.eu
2019-10-17T20:29:40.586351shield sshd\[17129\]: Failed password for invalid user schedule from 94.23.208.211 port 57678 ssh2
2019-10-17T20:33:20.361404shield sshd\[17634\]: Invalid user users123 from 94.23.208.211 port 39794
2019-10-17T20:33:20.365996shield sshd\[17634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns303460.ip-94-23-208.eu
2019-10-18 07:26:41
81.22.45.115 attack
*Port Scan* detected from 81.22.45.115 (RU/Russia/-). 4 hits in the last 235 seconds
2019-10-18 07:20:51
106.13.125.84 attackspam
$f2bV_matches
2019-10-18 07:26:27
124.29.217.102 attack
2019-10-17T19:49:47Z - RDP login failed multiple times. (124.29.217.102)
2019-10-18 07:20:35
201.149.10.165 attack
Mar 13 23:28:55 odroid64 sshd\[10813\]: User root from 201.149.10.165 not allowed because not listed in AllowUsers
Mar 13 23:28:55 odroid64 sshd\[10813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.10.165  user=root
Mar 13 23:28:57 odroid64 sshd\[10813\]: Failed password for invalid user root from 201.149.10.165 port 51256 ssh2
Mar 27 19:05:36 odroid64 sshd\[17945\]: Invalid user vo from 201.149.10.165
Mar 27 19:05:36 odroid64 sshd\[17945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.10.165
Mar 27 19:05:38 odroid64 sshd\[17945\]: Failed password for invalid user vo from 201.149.10.165 port 37240 ssh2
Apr 10 11:33:48 odroid64 sshd\[3143\]: Invalid user ts3 from 201.149.10.165
Apr 10 11:33:48 odroid64 sshd\[3143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.10.165
Apr 10 11:33:50 odroid64 sshd\[3143\]: Failed password for 
...
2019-10-18 07:39:28

Recently Reported IPs

104.22.52.204 104.22.52.202 104.22.52.213 104.22.52.196
101.213.145.153 104.22.52.228 104.22.52.218 104.22.52.248
104.22.52.247 104.22.52.69 104.22.52.70 104.22.52.76
104.22.52.83 104.22.52.71 104.22.52.91 104.22.52.94
104.22.52.98 104.22.53.100 104.22.53.101 104.22.53.109