Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.57.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25406
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.57.120.			IN	A

;; AUTHORITY SECTION:
.			145	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022201 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 04:13:18 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 120.57.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.57.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
132.255.29.229 attack
Invalid user oracle from 132.255.29.229 port 48232
2019-07-27 23:34:04
121.201.34.97 attackspambots
Invalid user hw from 121.201.34.97 port 33478
2019-07-28 00:07:35
176.109.235.220 attack
scan z
2019-07-28 00:15:22
36.91.216.151 attackspambots
Invalid user ubnt from 36.91.216.151 port 10809
2019-07-27 23:22:42
14.181.144.63 attackspambots
Invalid user UBNT from 14.181.144.63 port 49280
2019-07-27 23:25:30
140.246.127.145 attack
3389BruteforceIDS
2019-07-28 00:38:33
140.143.69.34 attackspambots
Invalid user info from 140.143.69.34 port 45375
2019-07-28 00:03:57
203.186.158.178 attackbotsspam
Invalid user steam from 203.186.158.178 port 17155
2019-07-27 23:27:31
123.1.186.5 attackspambots
Invalid user guest from 123.1.186.5 port 57102
2019-07-28 00:07:00
46.105.94.103 attackbots
Jul 27 15:57:54 MK-Soft-VM6 sshd\[32623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.94.103  user=root
Jul 27 15:57:56 MK-Soft-VM6 sshd\[32623\]: Failed password for root from 46.105.94.103 port 44396 ssh2
Jul 27 16:05:45 MK-Soft-VM6 sshd\[32701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.94.103  user=root
...
2019-07-28 00:20:12
36.79.205.138 attack
Invalid user UBNT from 36.79.205.138 port 56523
2019-07-27 23:48:00
213.159.208.86 attackspambots
Invalid user boris from 213.159.208.86 port 51526
2019-07-27 23:26:52
31.127.219.209 attackspam
Invalid user su from 31.127.219.209 port 33048
2019-07-27 23:24:17
177.21.202.119 attack
SMTP-sasl brute force
...
2019-07-28 00:37:06
139.59.38.252 attack
Invalid user pork from 139.59.38.252 port 45402
2019-07-28 00:04:27

Recently Reported IPs

104.22.57.117 104.22.57.123 104.22.57.125 104.22.57.222
104.22.58.123 104.22.58.144 104.22.58.192 104.22.58.222
173.155.212.102 104.22.59.123 104.22.59.144 104.22.59.192
104.22.59.222 104.22.6.105 151.50.107.74 104.22.6.157
104.22.6.20 104.22.6.42 104.22.62.145 104.22.63.145