Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.8.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.8.213.			IN	A

;; AUTHORITY SECTION:
.			503	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:47:46 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 213.8.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.8.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
69.70.68.42 attack
Aug  3 22:34:12 vps sshd[817753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=modemcable042.68-70-69.static.videotron.ca
Aug  3 22:34:13 vps sshd[817753]: Failed password for invalid user ubuntu@admin from 69.70.68.42 port 38049 ssh2
Aug  3 22:38:04 vps sshd[837086]: Invalid user pAsSWOrD from 69.70.68.42 port 54810
Aug  3 22:38:04 vps sshd[837086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=modemcable042.68-70-69.static.videotron.ca
Aug  3 22:38:05 vps sshd[837086]: Failed password for invalid user pAsSWOrD from 69.70.68.42 port 54810 ssh2
...
2020-08-04 04:42:00
49.232.29.120 attackspam
$f2bV_matches
2020-08-04 04:31:26
132.232.19.28 attackspam
"$f2bV_matches"
2020-08-04 04:43:58
106.75.152.83 attackspam
Aug  3 22:34:49 buvik sshd[31687]: Failed password for root from 106.75.152.83 port 46996 ssh2
Aug  3 22:37:59 buvik sshd[32163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.152.83  user=root
Aug  3 22:38:01 buvik sshd[32163]: Failed password for root from 106.75.152.83 port 42304 ssh2
...
2020-08-04 04:45:20
176.122.166.102 attack
Aug  3 22:27:39 server sshd[47627]: Failed password for root from 176.122.166.102 port 50782 ssh2
Aug  3 22:33:14 server sshd[49422]: Failed password for root from 176.122.166.102 port 42816 ssh2
Aug  3 22:37:56 server sshd[51167]: Failed password for root from 176.122.166.102 port 34886 ssh2
2020-08-04 04:46:55
212.70.149.19 attack
Aug  3 22:40:25 relay postfix/smtpd\[28922\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  3 22:40:40 relay postfix/smtpd\[8912\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  3 22:40:47 relay postfix/smtpd\[7895\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  3 22:41:02 relay postfix/smtpd\[8912\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  3 22:41:10 relay postfix/smtpd\[2209\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-04 04:45:57
193.112.23.105 attackbotsspam
SSH invalid-user multiple login try
2020-08-04 04:31:58
67.131.93.42 attackbots
leo_www
2020-08-04 04:42:28
95.110.101.236 attackspambots
Fail2Ban Ban Triggered
HTTP Attempted Bot Registration
2020-08-04 04:16:23
149.56.19.4 attack
149.56.19.4 - - [03/Aug/2020:15:57:10 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.56.19.4 - - [03/Aug/2020:15:57:17 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.56.19.4 - - [03/Aug/2020:15:57:23 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-04 04:13:47
23.82.29.250 attack
(From eric@talkwithwebvisitor.com) Cool website!

My name’s Eric, and I just found your site - millnerchiro.com - while surfing the net. You showed up at the top of the search results, so I checked you out. Looks like what you’re doing is pretty cool.
 
But if you don’t mind me asking – after someone like me stumbles across millnerchiro.com, what usually happens?

Is your site generating leads for your business? 
 
I’m guessing some, but I also bet you’d like more… studies show that 7 out 10 who land on a site wind up leaving without a trace.

Not good.

Here’s a thought – what if there was an easy way for every visitor to “raise their hand” to get a phone call from you INSTANTLY… the second they hit your site and said, “call me now.”

You can –
  
Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  It lets you know IMMEDIATELY – so that you can talk to that lead while they’re literally looking over your si
2020-08-04 04:30:34
139.59.10.42 attackspam
Aug  3 22:34:45 home sshd[2153046]: Failed password for root from 139.59.10.42 port 57884 ssh2
Aug  3 22:36:17 home sshd[2153854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.10.42  user=root
Aug  3 22:36:19 home sshd[2153854]: Failed password for root from 139.59.10.42 port 52020 ssh2
Aug  3 22:37:52 home sshd[2154345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.10.42  user=root
Aug  3 22:37:53 home sshd[2154345]: Failed password for root from 139.59.10.42 port 46158 ssh2
...
2020-08-04 04:48:51
138.68.221.125 attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-04 04:29:57
185.140.243.54 attackspam
(smtpauth) Failed SMTP AUTH login from 185.140.243.54 (IR/Iran/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-04 01:08:06 plain authenticator failed for ([185.140.243.54]) [185.140.243.54]: 535 Incorrect authentication data (set_id=reta.reta5246)
2020-08-04 04:40:36
35.220.195.110 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-04 04:21:18

Recently Reported IPs

104.22.8.225 104.22.8.156 104.22.75.245 104.22.8.150
104.22.8.207 104.22.8.233 104.22.8.25 104.22.74.245
104.22.8.252 104.22.8.75 104.22.8.62 104.22.8.90
104.22.9.150 104.22.9.13 104.22.9.117 104.22.9.207
104.22.9.189 104.22.8.92 104.22.9.156 104.22.9.225