Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.72.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43088
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.72.159.			IN	A

;; AUTHORITY SECTION:
.			244	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022202 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 13:01:02 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 159.72.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.72.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.172.52.225 attackbots
Sep 25 09:16:20 gw1 sshd[26474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.52.225
Sep 25 09:16:22 gw1 sshd[26474]: Failed password for invalid user ping from 167.172.52.225 port 38594 ssh2
...
2020-09-25 14:34:07
103.84.130.130 attack
Sep 25 08:33:49 host sshd[1711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.130.130  user=root
Sep 25 08:33:51 host sshd[1711]: Failed password for root from 103.84.130.130 port 42346 ssh2
...
2020-09-25 14:39:31
62.112.11.88 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-25T02:42:38Z and 2020-09-25T03:04:51Z
2020-09-25 14:01:46
128.199.182.19 attackbotsspam
Invalid user sms from 128.199.182.19 port 49874
2020-09-25 14:34:28
54.39.125.16 attack
E-mail Spam RBL
...
2020-09-25 14:36:32
221.197.216.53 attackbots
Brute force blocker - service: proftpd1 - aantal: 135 - Wed Sep  5 07:50:14 2018
2020-09-25 14:33:18
13.90.128.104 attackspambots
Sep 25 07:53:51 fhem-rasp sshd[19099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.90.128.104  user=root
Sep 25 07:53:53 fhem-rasp sshd[19099]: Failed password for root from 13.90.128.104 port 64023 ssh2
...
2020-09-25 14:24:07
188.166.240.30 attack
2020-09-25T04:04:14.188189abusebot-5.cloudsearch.cf sshd[18732]: Invalid user git from 188.166.240.30 port 50028
2020-09-25T04:04:14.194880abusebot-5.cloudsearch.cf sshd[18732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.30
2020-09-25T04:04:14.188189abusebot-5.cloudsearch.cf sshd[18732]: Invalid user git from 188.166.240.30 port 50028
2020-09-25T04:04:16.249099abusebot-5.cloudsearch.cf sshd[18732]: Failed password for invalid user git from 188.166.240.30 port 50028 ssh2
2020-09-25T04:10:55.556212abusebot-5.cloudsearch.cf sshd[18744]: Invalid user denis from 188.166.240.30 port 58582
2020-09-25T04:10:55.562994abusebot-5.cloudsearch.cf sshd[18744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.30
2020-09-25T04:10:55.556212abusebot-5.cloudsearch.cf sshd[18744]: Invalid user denis from 188.166.240.30 port 58582
2020-09-25T04:10:57.335883abusebot-5.cloudsearch.cf sshd[18744]: Faile
...
2020-09-25 14:14:09
189.125.102.208 attack
(sshd) Failed SSH login from 189.125.102.208 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 25 01:50:28 server5 sshd[1537]: Invalid user jack from 189.125.102.208
Sep 25 01:50:28 server5 sshd[1537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.102.208 
Sep 25 01:50:30 server5 sshd[1537]: Failed password for invalid user jack from 189.125.102.208 port 48417 ssh2
Sep 25 01:53:46 server5 sshd[3018]: Invalid user prueba from 189.125.102.208
Sep 25 01:53:46 server5 sshd[3018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.102.208
2020-09-25 14:33:39
13.78.70.233 attack
$f2bV_matches
2020-09-25 14:49:27
13.76.26.35 attack
(sshd) Failed SSH login from 13.76.26.35 (SG/Singapore/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD
2020-09-25 14:04:38
210.92.18.162 attack
lfd: (smtpauth) Failed SMTP AUTH login from 210.92.18.162 (host.webhostingservice.ml): 5 in the last 3600 secs - Wed Sep  5 02:20:04 2018
2020-09-25 14:38:43
165.232.116.223 attackbots
Sep 25 04:25:17 pve1 sshd[22994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.116.223 
Sep 25 04:25:20 pve1 sshd[22994]: Failed password for invalid user stan from 165.232.116.223 port 33632 ssh2
...
2020-09-25 14:45:25
110.88.160.233 attack
Invalid user william from 110.88.160.233 port 52622
2020-09-25 14:20:23
103.27.61.101 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-25 14:48:48

Recently Reported IPs

104.22.71.247 104.22.74.146 104.22.74.73 104.22.75.157
104.22.75.114 104.22.74.114 104.22.73.159 104.22.75.146
104.22.75.73 104.22.74.157 104.22.76.156 104.22.76.196
104.22.76.79 104.22.76.233 104.22.77.156 104.22.76.189
104.22.76.64 104.22.77.189 104.22.77.233 104.22.77.196