Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.75.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.75.127.			IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022033100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 31 17:03:29 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 127.75.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 127.75.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.221.250.23 attackspam
Automatic report - XMLRPC Attack
2019-11-09 23:42:12
80.211.16.26 attack
Nov  9 10:19:12 TORMINT sshd\[24545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.16.26  user=syslog
Nov  9 10:19:14 TORMINT sshd\[24545\]: Failed password for syslog from 80.211.16.26 port 40684 ssh2
Nov  9 10:22:50 TORMINT sshd\[24836\]: Invalid user noi from 80.211.16.26
Nov  9 10:22:50 TORMINT sshd\[24836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.16.26
...
2019-11-09 23:32:49
154.83.17.188 attackbots
Nov  6 07:12:47 new sshd[26355]: Failed password for invalid user mb from 154.83.17.188 port 47170 ssh2
Nov  6 07:12:47 new sshd[26355]: Received disconnect from 154.83.17.188: 11: Bye Bye [preauth]
Nov  6 07:22:01 new sshd[28820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.17.188  user=r.r
Nov  6 07:22:03 new sshd[28820]: Failed password for r.r from 154.83.17.188 port 56162 ssh2
Nov  6 07:22:04 new sshd[28820]: Received disconnect from 154.83.17.188: 11: Bye Bye [preauth]
Nov  6 07:26:10 new sshd[29941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.17.188  user=r.r
Nov  6 07:26:13 new sshd[29941]: Failed password for r.r from 154.83.17.188 port 38116 ssh2
Nov  6 07:26:13 new sshd[29941]: Received disconnect from 154.83.17.188: 11: Bye Bye [preauth]
Nov  6 07:30:20 new sshd[31096]: Failed password for invalid user dylan from 154.83.17.188 port 48302 ssh2
Nov  6 07:30:2........
-------------------------------
2019-11-09 23:43:35
74.117.153.221 attackbotsspam
Nov  9 05:24:17 tdfoods sshd\[28520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.117.153.221  user=root
Nov  9 05:24:19 tdfoods sshd\[28520\]: Failed password for root from 74.117.153.221 port 58480 ssh2
Nov  9 05:28:25 tdfoods sshd\[28839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.117.153.221  user=root
Nov  9 05:28:27 tdfoods sshd\[28839\]: Failed password for root from 74.117.153.221 port 40848 ssh2
Nov  9 05:32:29 tdfoods sshd\[29179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.117.153.221  user=root
2019-11-09 23:36:34
46.36.16.28 attackbots
port 23 attempt blocked
2019-11-09 23:45:24
212.69.18.234 attackspambots
Automatic report - Port Scan Attack
2019-11-09 23:55:05
202.54.157.6 attack
Automatic report - Banned IP Access
2019-11-09 23:41:16
47.63.249.26 attackbotsspam
port 23 attempt blocked
2019-11-09 23:43:15
68.183.91.25 attackspambots
$f2bV_matches
2019-11-09 23:54:41
218.92.0.191 attackspambots
Nov  9 15:56:57 dcd-gentoo sshd[3427]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Nov  9 15:56:57 dcd-gentoo sshd[3427]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Nov  9 15:56:59 dcd-gentoo sshd[3427]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Nov  9 15:56:57 dcd-gentoo sshd[3427]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Nov  9 15:56:59 dcd-gentoo sshd[3427]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Nov  9 15:56:59 dcd-gentoo sshd[3427]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 22510 ssh2
...
2019-11-09 23:29:10
45.227.254.30 attackbots
Nov  9 15:47:56 mc1 kernel: \[4597165.021198\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.227.254.30 DST=159.69.205.51 LEN=40 TOS=0x08 PREC=0x00 TTL=239 ID=41524 PROTO=TCP SPT=50771 DPT=33891 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  9 15:48:05 mc1 kernel: \[4597174.445413\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.227.254.30 DST=159.69.205.51 LEN=40 TOS=0x08 PREC=0x00 TTL=239 ID=5253 PROTO=TCP SPT=50771 DPT=3489 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  9 15:57:04 mc1 kernel: \[4597712.760584\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.227.254.30 DST=159.69.205.51 LEN=40 TOS=0x08 PREC=0x00 TTL=239 ID=11109 PROTO=TCP SPT=50771 DPT=33894 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-09 23:26:35
117.50.38.202 attackbotsspam
Nov  9 17:14:08 server sshd\[26646\]: Invalid user dvcs from 117.50.38.202 port 44542
Nov  9 17:14:08 server sshd\[26646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.202
Nov  9 17:14:10 server sshd\[26646\]: Failed password for invalid user dvcs from 117.50.38.202 port 44542 ssh2
Nov  9 17:20:14 server sshd\[31771\]: User root from 117.50.38.202 not allowed because listed in DenyUsers
Nov  9 17:20:14 server sshd\[31771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.202  user=root
2019-11-09 23:50:12
220.133.19.42 attackbots
Fail2Ban Ban Triggered
2019-11-10 00:02:38
80.151.236.165 attack
Nov  9 16:35:38 localhost sshd\[27499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.151.236.165  user=root
Nov  9 16:35:40 localhost sshd\[27499\]: Failed password for root from 80.151.236.165 port 32994 ssh2
Nov  9 16:39:36 localhost sshd\[27812\]: Invalid user pi from 80.151.236.165 port 48424
Nov  9 16:39:36 localhost sshd\[27812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.151.236.165
2019-11-09 23:52:34
50.199.94.84 attackbots
2019-11-09T15:40:20.811328shield sshd\[2626\]: Invalid user P@\$\$w0rd from 50.199.94.84 port 44062
2019-11-09T15:40:20.817237shield sshd\[2626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.199.94.84
2019-11-09T15:40:23.204197shield sshd\[2626\]: Failed password for invalid user P@\$\$w0rd from 50.199.94.84 port 44062 ssh2
2019-11-09T15:44:18.434924shield sshd\[3051\]: Invalid user not from 50.199.94.84 port 53734
2019-11-09T15:44:18.440359shield sshd\[3051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.199.94.84
2019-11-09 23:47:40

Recently Reported IPs

104.22.75.113 104.22.75.168 104.22.75.72 104.22.78.203
104.22.78.42 104.22.78.87 104.22.79.203 104.22.79.87
104.220.228.206 104.221.117.8 104.221.176.198 104.223.136.171
104.223.188.215 104.223.232.132 104.223.37.100 104.223.42.111
104.223.69.220 104.223.69.242 104.224.184.171 104.225.217.201