Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.74.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.74.153.			IN	A

;; AUTHORITY SECTION:
.			294	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 01:50:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 153.74.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 153.74.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.234.97.139 attackbotsspam
2019-12-01T00:57:11.454873suse-nuc sshd[15391]: Invalid user hirose from 62.234.97.139 port 52718
...
2020-02-25 14:50:48
49.234.189.19 attackspambots
Feb 25 01:23:27 l03 sshd[22352]: Invalid user opensource from 49.234.189.19 port 41250
...
2020-02-25 15:05:00
122.128.212.74 attackbotsspam
Honeypot attack, port: 4567, PTR: PTR record not found
2020-02-25 15:06:57
5.9.83.84 attack
Bad bot/spoofed identity
2020-02-25 15:02:03
103.139.181.1 attackspam
suspicious action Mon, 24 Feb 2020 20:19:22 -0300
2020-02-25 14:24:12
95.125.116.35 attackspam
Honeypot attack, port: 5555, PTR: 35.red-95-125-116.dynamicip.rima-tde.net.
2020-02-25 15:17:32
80.250.217.50 attackspambots
2019-11-21T03:01:16.843753suse-nuc sshd[18347]: Invalid user guest from 80.250.217.50 port 34048
...
2020-02-25 14:24:38
49.88.112.62 attackspambots
Feb 25 07:57:38 MK-Soft-VM5 sshd[766]: Failed password for root from 49.88.112.62 port 48883 ssh2
Feb 25 07:57:42 MK-Soft-VM5 sshd[766]: Failed password for root from 49.88.112.62 port 48883 ssh2
...
2020-02-25 15:00:16
185.9.226.28 attackbotsspam
ssh brute force
2020-02-25 14:23:55
188.166.232.14 attackbotsspam
2020-01-12T07:13:20.751333suse-nuc sshd[30078]: Invalid user jenkins from 188.166.232.14 port 41808
...
2020-02-25 14:58:59
114.33.187.57 attackbots
Unauthorized connection attempt detected from IP address 114.33.187.57 to port 4567 [J]
2020-02-25 15:12:25
218.28.78.243 attackspam
Port probing on unauthorized port 1433
2020-02-25 15:12:56
177.44.18.96 attack
TCP src-port=44873   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (141)
2020-02-25 14:49:56
111.161.74.106 attackspambots
Invalid user bb2server from 111.161.74.106 port 57121
2020-02-25 14:59:23
78.131.56.62 attackspambots
web-1 [ssh_2] SSH Attack
2020-02-25 14:57:30

Recently Reported IPs

94.103.183.7 104.22.74.161 93.117.132.35 104.22.74.18
104.22.75.137 203.2.36.231 44.22.137.143 104.22.75.153
104.22.75.161 104.22.76.190 104.22.76.94 104.22.77.190
104.22.77.94 104.22.78.115 104.22.78.151 104.22.78.208
104.22.78.229 104.22.79.115 104.22.79.208 104.22.79.229