Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.8.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.8.194.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031801 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 19 09:39:01 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 194.8.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.8.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.152.214.172 attackspam
Oct 20 20:10:01 meumeu sshd[17678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.214.172 
Oct 20 20:10:03 meumeu sshd[17678]: Failed password for invalid user 1halt from 122.152.214.172 port 43646 ssh2
Oct 20 20:14:31 meumeu sshd[18315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.214.172 
...
2019-10-21 02:42:48
201.91.132.170 attackbots
$f2bV_matches
2019-10-21 02:25:03
106.12.198.232 attackbotsspam
Oct 20 15:09:32 vps647732 sshd[17154]: Failed password for root from 106.12.198.232 port 41388 ssh2
...
2019-10-21 02:27:35
39.87.171.10 attackspam
Unauthorised access (Oct 20) SRC=39.87.171.10 LEN=40 TTL=49 ID=1658 TCP DPT=8080 WINDOW=55574 SYN 
Unauthorised access (Oct 20) SRC=39.87.171.10 LEN=40 TTL=49 ID=5631 TCP DPT=8080 WINDOW=32430 SYN
2019-10-21 02:53:14
171.226.229.22 attackspambots
Fail2Ban Ban Triggered
2019-10-21 02:32:34
142.44.137.62 attack
detected by Fail2Ban
2019-10-21 02:38:46
46.225.243.65 attack
Automatic report - XMLRPC Attack
2019-10-21 02:20:16
223.244.236.232 attack
(Oct 20)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=14134 TCP DPT=8080 WINDOW=39504 SYN 
 (Oct 20)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=5787 TCP DPT=8080 WINDOW=39504 SYN 
 (Oct 19)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=45902 TCP DPT=8080 WINDOW=63478 SYN 
 (Oct 18)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=58054 TCP DPT=8080 WINDOW=63478 SYN 
 (Oct 18)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=14680 TCP DPT=8080 WINDOW=39504 SYN 
 (Oct 17)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=22218 TCP DPT=8080 WINDOW=39504 SYN 
 (Oct 16)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=24762 TCP DPT=8080 WINDOW=39504 SYN 
 (Oct 15)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=26657 TCP DPT=8080 WINDOW=63478 SYN 
 (Oct 15)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=1728 TCP DPT=8080 WINDOW=63478 SYN 
 (Oct 15)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=32634 TCP DPT=8080 WINDOW=63478 SYN 
 (Oct 14)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=13661 TCP DPT=8080 WINDOW=63478 SYN
2019-10-21 02:35:23
5.160.92.186 attack
Automatic report - Banned IP Access
2019-10-21 02:23:37
80.211.9.57 attackspambots
failed root login
2019-10-21 02:57:42
103.129.121.78 attackbotsspam
port scan and connect, tcp 5432 (postgresql)
2019-10-21 02:53:46
109.165.235.249 attackbots
SMB Server BruteForce Attack
2019-10-21 02:48:37
157.245.73.144 attackbotsspam
Invalid user head from 157.245.73.144 port 54542
2019-10-21 02:56:14
182.151.7.70 attackbotsspam
2019-10-20T21:11:17.779311tmaserv sshd\[14408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.7.70  user=root
2019-10-20T21:11:20.230753tmaserv sshd\[14408\]: Failed password for root from 182.151.7.70 port 44174 ssh2
2019-10-20T21:15:48.995186tmaserv sshd\[14591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.7.70  user=root
2019-10-20T21:15:50.649249tmaserv sshd\[14591\]: Failed password for root from 182.151.7.70 port 51988 ssh2
2019-10-20T21:20:23.783796tmaserv sshd\[14788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.7.70  user=root
2019-10-20T21:20:25.522751tmaserv sshd\[14788\]: Failed password for root from 182.151.7.70 port 59810 ssh2
...
2019-10-21 02:30:48
59.126.12.119 attack
" "
2019-10-21 02:50:30

Recently Reported IPs

104.22.8.108 104.22.9.108 104.22.9.194 104.222.79.100
104.223.217.130 104.224.230.215 104.23.133.12 104.23.134.12
104.23.141.157 104.232.37.86 104.233.147.243 104.233.158.17
104.233.171.99 104.233.192.242 104.233.192.243 104.233.192.244
104.233.192.245 104.233.192.246 104.233.231.200 104.233.242.196