Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.61.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51949
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.61.166.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:41:19 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 166.61.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.61.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.226.114.97 attackspambots
Invalid user admin from 129.226.114.97 port 48094
2020-06-04 06:27:19
139.155.79.7 attack
leo_www
2020-06-04 07:04:37
79.124.62.82 attack
Jun  4 00:22:52 debian kernel: [121935.882770] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=79.124.62.82 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=42824 PROTO=TCP SPT=46868 DPT=2224 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-04 06:36:59
175.139.194.125 attack
SMTP:25. 41 login attempts blocked over 42 days.
2020-06-04 06:51:59
164.52.24.175 attack
Unauthorized connection attempt detected from IP address 164.52.24.175 to port 8888 [T]
2020-06-04 06:54:25
182.254.220.40 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-04 06:40:15
192.210.192.165 attack
20 attempts against mh-ssh on echoip
2020-06-04 06:45:15
51.178.50.20 attack
Brute-force attempt banned
2020-06-04 06:34:57
139.59.13.55 attack
fail2ban -- 139.59.13.55
...
2020-06-04 06:43:59
188.59.137.188 attackspambots
Automatic report - Port Scan Attack
2020-06-04 06:32:15
37.49.226.126 attackbotsspam
ZTE Router Exploit Scanner
2020-06-04 06:51:36
194.28.57.30 attackbotsspam
Jun  3 23:14:04 debian kernel: [117808.261822] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=194.28.57.30 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=50603 PROTO=TCP SPT=26530 DPT=23 WINDOW=42106 RES=0x00 SYN URGP=0
2020-06-04 06:31:53
88.200.214.71 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-04 06:42:21
106.54.40.151 attackbotsspam
$f2bV_matches
2020-06-04 06:53:04
110.88.128.232 attack
Jun  3 23:57:14 piServer sshd[28978]: Failed password for root from 110.88.128.232 port 41746 ssh2
Jun  3 23:59:11 piServer sshd[29093]: Failed password for root from 110.88.128.232 port 41606 ssh2
...
2020-06-04 06:27:55

Recently Reported IPs

104.22.61.178 104.22.61.170 104.22.61.180 104.22.61.174
104.22.61.168 104.22.61.185 104.22.61.189 104.22.61.187
104.22.61.196 104.22.61.204 104.22.61.206 104.22.61.213
104.22.61.208 104.22.61.210 104.22.61.68 104.22.61.225
104.22.61.245 104.22.61.254 104.22.61.69 104.22.61.73