Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.22.55.74 attack
test
2023-11-03 07:27:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.55.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.55.64.			IN	A

;; AUTHORITY SECTION:
.			357	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022201 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 04:12:35 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 64.55.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.55.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.62.232.13 attackbots
445/tcp 1433/tcp...
[2019-10-19/11-29]6pkt,2pt.(tcp)
2019-11-30 07:13:45
1.192.145.246 attackbots
port scan/probe/communication attempt
2019-11-30 07:19:16
106.51.98.1 attackspambots
SSH login attempts with user root.
2019-11-30 06:49:12
37.59.100.22 attackspambots
Nov 29 18:10:01 MK-Soft-VM6 sshd[5998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.100.22 
Nov 29 18:10:03 MK-Soft-VM6 sshd[5998]: Failed password for invalid user schei from 37.59.100.22 port 50920 ssh2
...
2019-11-30 06:58:02
27.71.232.142 attack
445/tcp 1433/tcp
[2019-10-16/11-29]2pkt
2019-11-30 07:19:36
78.24.217.236 attackbots
"GET /_adminer HTTP/1.1" 404
"GET /_adminer.php HTTP/1.1" 404
"GET /ad.php HTTP/1.1" 404
"GET /adm.php HTTP/1.1" 404
"GET /adminer HTTP/1.1" 404
"GET /adminer.php HTTP/1.1" 404
"GET /db.php HTTP/1.1" 404
"GET /mysql.php HTTP/1.1" 404
2019-11-30 06:50:09
188.131.190.3 attackspam
Nov 30 00:56:47 itv-usvr-01 sshd[17244]: Invalid user tanya from 188.131.190.3
Nov 30 00:56:47 itv-usvr-01 sshd[17244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.190.3
Nov 30 00:56:47 itv-usvr-01 sshd[17244]: Invalid user tanya from 188.131.190.3
Nov 30 00:56:50 itv-usvr-01 sshd[17244]: Failed password for invalid user tanya from 188.131.190.3 port 35496 ssh2
Nov 30 00:59:53 itv-usvr-01 sshd[17342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.190.3  user=root
Nov 30 00:59:55 itv-usvr-01 sshd[17342]: Failed password for root from 188.131.190.3 port 36242 ssh2
2019-11-30 07:16:39
111.68.104.1 attackbotsspam
SSH login attempts with user root.
2019-11-30 06:45:10
106.51.0.4 attackspam
SSH login attempts with user root.
2019-11-30 06:49:37
167.99.180.229 attackspambots
Nov 29 18:17:43 [host] sshd[15121]: Invalid user energeti from 167.99.180.229
Nov 29 18:17:43 [host] sshd[15121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.180.229
Nov 29 18:17:45 [host] sshd[15121]: Failed password for invalid user energeti from 167.99.180.229 port 43802 ssh2
2019-11-30 07:05:27
111.253.205.156 attackbotsspam
firewall-block, port(s): 445/tcp
2019-11-30 07:00:32
106.12.159.2 attackspambots
SSH login attempts with user root.
2019-11-30 06:55:55
103.66.16.1 attackspambots
SSH login attempts with user root.
2019-11-30 07:02:22
173.245.52.169 attackspambots
8080/tcp 8443/tcp...
[2019-11-15/29]4pkt,2pt.(tcp)
2019-11-30 07:16:56
106.52.17.2 attack
web Attack on Wordpress site
2019-11-30 06:48:50

Recently Reported IPs

104.22.55.196 104.22.55.69 104.22.56.117 104.22.56.120
104.22.56.123 104.22.56.125 104.22.56.149 82.160.74.45
104.22.56.151 104.22.56.163 252.231.254.201 104.22.56.194
104.22.56.217 104.22.56.222 104.22.56.246 104.22.57.102
104.22.57.107 44.53.78.141 104.22.57.117 104.22.57.120