Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.52.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.52.89.			IN	A

;; AUTHORITY SECTION:
.			434	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052100 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 21 18:37:47 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 89.52.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.52.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.49.224.76 attack
Port scanning [2 denied]
2020-08-13 17:25:56
51.178.78.154 attack
proto=tcp  .  spt=51243  .  dpt=995  .  src=51.178.78.154  .  dst=xx.xx.4.1  .     Listed on    rbldns-ru also zen-spamhaus and abuseat-org     (31)
2020-08-13 17:15:08
213.217.1.26 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-13 17:17:02
180.76.96.55 attackspambots
SSH Brute-Forcing (server2)
2020-08-13 17:43:46
139.162.66.65 attack
Icarus honeypot on github
2020-08-13 17:29:50
187.141.128.42 attack
Aug 13 10:37:30 pve1 sshd[12925]: Failed password for root from 187.141.128.42 port 58238 ssh2
...
2020-08-13 17:41:41
205.185.117.149 attackbots
Automatic report - Banned IP Access
2020-08-13 17:20:28
103.27.116.2 attackbots
Aug 13 08:51:27 ns382633 sshd\[25953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.116.2  user=root
Aug 13 08:51:29 ns382633 sshd\[25953\]: Failed password for root from 103.27.116.2 port 33308 ssh2
Aug 13 09:00:46 ns382633 sshd\[27441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.116.2  user=root
Aug 13 09:00:48 ns382633 sshd\[27441\]: Failed password for root from 103.27.116.2 port 53178 ssh2
Aug 13 09:06:25 ns382633 sshd\[28487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.116.2  user=root
2020-08-13 17:04:02
111.207.105.199 attackspam
sshd: Failed password for .... from 111.207.105.199 port 46472 ssh2 (12 attempts)
2020-08-13 17:39:49
103.45.190.242 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-13 17:42:07
45.129.33.16 attackbotsspam
 TCP (SYN) 45.129.33.16:52722 -> port 16405, len 44
2020-08-13 17:35:28
50.237.128.182 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 9530 proto: tcp cat: Misc Attackbytes: 60
2020-08-13 17:31:39
177.91.182.170 attackspam
mail brute force
2020-08-13 17:40:41
185.176.27.190 attackbotsspam
firewall-block, port(s): 9386/tcp, 64690/tcp
2020-08-13 17:23:48
206.126.81.102 attackbots
sshd: Failed password for .... from 206.126.81.102 port 57858 ssh2 (4 attempts)
2020-08-13 17:06:13

Recently Reported IPs

104.22.52.78 104.22.53.103 104.22.53.125 104.22.53.129
104.22.53.144 104.22.53.172 104.22.53.203 104.22.53.210
104.22.53.212 104.22.53.239 104.22.53.78 104.22.53.89
104.22.54.224 104.22.54.70 104.22.54.82 104.22.55.224
104.22.55.70 104.22.55.82 104.22.56.152 104.22.56.185