Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.61.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32920
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.61.79.			IN	A

;; AUTHORITY SECTION:
.			233	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 05:28:42 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 79.61.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 79.61.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.4.131.70 attackspam
1577341440 - 12/26/2019 07:24:00 Host: 1.4.131.70/1.4.131.70 Port: 445 TCP Blocked
2019-12-26 19:08:07
112.215.141.101 attackbots
20 attempts against mh-ssh on cloud.magehost.pro
2019-12-26 19:32:42
80.17.244.2 attackspam
Dec 26 11:19:55 ns3110291 sshd\[9302\]: Invalid user chidley from 80.17.244.2
Dec 26 11:19:56 ns3110291 sshd\[9302\]: Failed password for invalid user chidley from 80.17.244.2 port 36238 ssh2
Dec 26 11:23:27 ns3110291 sshd\[9350\]: Invalid user admin from 80.17.244.2
Dec 26 11:23:29 ns3110291 sshd\[9350\]: Failed password for invalid user admin from 80.17.244.2 port 36130 ssh2
Dec 26 11:26:57 ns3110291 sshd\[9419\]: Invalid user oralcle from 80.17.244.2
...
2019-12-26 19:20:38
45.95.35.32 attackspam
Autoban   45.95.35.32 AUTH/CONNECT
2019-12-26 19:05:18
46.197.66.79 attackspam
Automatic report - SSH Brute-Force Attack
2019-12-26 19:28:48
200.86.228.10 attackspam
Dec 26 10:47:40 vmd17057 sshd\[12138\]: Invalid user webadmin from 200.86.228.10 port 39481
Dec 26 10:47:40 vmd17057 sshd\[12138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.86.228.10
Dec 26 10:47:41 vmd17057 sshd\[12138\]: Failed password for invalid user webadmin from 200.86.228.10 port 39481 ssh2
...
2019-12-26 19:09:22
1.56.146.72 attackbotsspam
Scanning
2019-12-26 19:37:27
61.142.20.2 attack
Scanning
2019-12-26 19:39:45
175.5.119.82 attackbots
FTP Brute Force
2019-12-26 19:24:56
69.245.220.97 attack
Dec 25 21:49:33 web9 sshd\[7718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.245.220.97  user=root
Dec 25 21:49:35 web9 sshd\[7718\]: Failed password for root from 69.245.220.97 port 40228 ssh2
Dec 25 21:52:56 web9 sshd\[8150\]: Invalid user dovecot from 69.245.220.97
Dec 25 21:52:56 web9 sshd\[8150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.245.220.97
Dec 25 21:52:58 web9 sshd\[8150\]: Failed password for invalid user dovecot from 69.245.220.97 port 44650 ssh2
2019-12-26 19:22:46
14.63.167.192 attackspambots
Dec 26 11:43:46 server sshd\[27202\]: Invalid user fourjs from 14.63.167.192
Dec 26 11:43:46 server sshd\[27202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192 
Dec 26 11:43:48 server sshd\[27202\]: Failed password for invalid user fourjs from 14.63.167.192 port 33738 ssh2
Dec 26 11:51:30 server sshd\[29005\]: Invalid user loevaas from 14.63.167.192
Dec 26 11:51:30 server sshd\[29005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192 
...
2019-12-26 19:25:54
159.203.197.31 attack
Unauthorized connection attempt detected from IP address 159.203.197.31 to port 4848
2019-12-26 19:15:36
49.235.23.20 attackspam
Dec 26 11:27:27 MK-Soft-Root2 sshd[29374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.23.20 
Dec 26 11:27:29 MK-Soft-Root2 sshd[29374]: Failed password for invalid user ingetraut from 49.235.23.20 port 56466 ssh2
...
2019-12-26 19:26:47
113.190.196.35 attackbots
This IP Address sent many spam to @bit.co.id
mhamdanrifai@gmail.com is administrator
2019-12-26 19:24:24
177.91.80.162 attackbots
Dec 26 11:47:07 DAAP sshd[6664]: Invalid user tiang from 177.91.80.162 port 34500
Dec 26 11:47:07 DAAP sshd[6664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.91.80.162
Dec 26 11:47:07 DAAP sshd[6664]: Invalid user tiang from 177.91.80.162 port 34500
Dec 26 11:47:09 DAAP sshd[6664]: Failed password for invalid user tiang from 177.91.80.162 port 34500 ssh2
Dec 26 11:53:13 DAAP sshd[6704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.91.80.162  user=root
Dec 26 11:53:15 DAAP sshd[6704]: Failed password for root from 177.91.80.162 port 32816 ssh2
...
2019-12-26 19:01:17

Recently Reported IPs

104.22.60.79 104.22.62.139 104.22.63.139 104.22.64.161
104.22.64.174 104.22.65.161 104.22.65.174 104.22.7.53
104.22.70.151 104.22.70.183 104.22.71.183 104.22.72.165
104.22.73.165 104.22.73.169 104.22.75.219 104.22.76.20
104.22.78.189 104.22.79.189 104.22.8.106 104.22.8.126