Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Monticello

Region: Arkansas

Country: United States

Internet Service Provider: Evolve Broadband

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       104.222.48.0 - 104.222.63.255
CIDR:           104.222.48.0/20
NetName:        VYVE-BROADBAND
NetHandle:      NET-104-222-48-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Vyve Broadband (VBL-52)
RegDate:        2014-10-20
Updated:        2019-09-27
Ref:            https://rdap.arin.net/registry/ip/104.222.48.0


OrgName:        Vyve Broadband
OrgId:          VBL-52
Address:        Four International Drive
Address:        Suite 330
City:           Rye Brook
StateProv:      NY
PostalCode:     10573
Country:        US
RegDate:        2019-02-07
Updated:        2025-12-29
Comment:        https://geofile.vyvebb.com/geofile
Ref:            https://rdap.arin.net/registry/entity/VBL-52


OrgTechHandle: NETWO1827-ARIN
OrgTechName:   Network Operations
OrgTechPhone:  +1-855-367-8983 
OrgTechEmail:  networkengineering@vyvebb.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO1827-ARIN

OrgAbuseHandle: VYVEA1-ARIN
OrgAbuseName:   Vyve-Abuse
OrgAbusePhone:  +1-855-367-8983 
OrgAbuseEmail:  abuse@vyvebb.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/VYVEA1-ARIN

# end


# start

NetRange:       104.222.48.0 - 104.222.63.255
CIDR:           104.222.48.0/20
NetName:        MONAR
NetHandle:      NET-104-222-48-0-2
Parent:         VYVE-BROADBAND (NET-104-222-48-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Vyve Broadband (C07432715)
RegDate:        2019-09-30
Updated:        2019-09-30
Ref:            https://rdap.arin.net/registry/ip/104.222.48.0


CustName:       Vyve Broadband
Address:        1920 US-425
City:           Monticello
StateProv:      AR
PostalCode:     71655
Country:        US
RegDate:        2019-09-30
Updated:        2019-09-30
Ref:            https://rdap.arin.net/registry/entity/C07432715

OrgTechHandle: NETWO1827-ARIN
OrgTechName:   Network Operations
OrgTechPhone:  +1-855-367-8983 
OrgTechEmail:  networkengineering@vyvebb.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO1827-ARIN

OrgAbuseHandle: VYVEA1-ARIN
OrgAbuseName:   Vyve-Abuse
OrgAbusePhone:  +1-855-367-8983 
OrgAbuseEmail:  abuse@vyvebb.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/VYVEA1-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.222.48.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.222.48.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 19:13:42 CST 2026
;; MSG SIZE  rcvd: 106
Host info
50.48.222.104.in-addr.arpa domain name pointer host-104-222-48-50.vyvebroadband.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.48.222.104.in-addr.arpa	name = host-104-222-48-50.vyvebroadband.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.43.127.236 attack
port 23
2020-03-22 20:12:40
74.115.176.1 attackbots
Unauthorised access (Mar 22) SRC=74.115.176.1 LEN=52 TTL=110 ID=8221 DF TCP DPT=445 WINDOW=8192 SYN
2020-03-22 20:45:45
104.196.127.133 attack
Wordpress attack
2020-03-22 20:31:57
92.118.37.55 attackbotsspam
Mar 22 13:18:59 debian-2gb-nbg1-2 kernel: \[7138633.133864\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.55 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=19983 PROTO=TCP SPT=52438 DPT=16610 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-22 20:21:51
83.239.186.54 attackbots
Automatic report - Port Scan Attack
2020-03-22 20:29:11
24.30.91.171 attackspambots
port 23
2020-03-22 20:25:24
51.38.71.191 attack
2020-03-22T10:52:59.497127abusebot-7.cloudsearch.cf sshd[15425]: Invalid user news from 51.38.71.191 port 59084
2020-03-22T10:52:59.501618abusebot-7.cloudsearch.cf sshd[15425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-51-38-71.eu
2020-03-22T10:52:59.497127abusebot-7.cloudsearch.cf sshd[15425]: Invalid user news from 51.38.71.191 port 59084
2020-03-22T10:53:02.008520abusebot-7.cloudsearch.cf sshd[15425]: Failed password for invalid user news from 51.38.71.191 port 59084 ssh2
2020-03-22T10:58:23.849930abusebot-7.cloudsearch.cf sshd[15794]: Invalid user d from 51.38.71.191 port 49960
2020-03-22T10:58:23.855644abusebot-7.cloudsearch.cf sshd[15794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-51-38-71.eu
2020-03-22T10:58:23.849930abusebot-7.cloudsearch.cf sshd[15794]: Invalid user d from 51.38.71.191 port 49960
2020-03-22T10:58:26.169114abusebot-7.cloudsearch.cf sshd[15794]: Failed passw
...
2020-03-22 20:46:45
185.245.41.25 attackspam
B: ssh repeated attack for invalid user
2020-03-22 20:10:34
61.95.233.61 attack
IP blocked
2020-03-22 20:09:55
134.209.194.217 attackbots
Mar 22 12:23:06 * sshd[21620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.194.217
Mar 22 12:23:08 * sshd[21620]: Failed password for invalid user distribution from 134.209.194.217 port 59814 ssh2
2020-03-22 20:22:48
133.130.123.76 attackspam
Mar 22 02:48:38 ws19vmsma01 sshd[186574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.123.76
Mar 22 02:48:40 ws19vmsma01 sshd[186574]: Failed password for invalid user uploader from 133.130.123.76 port 60430 ssh2
...
2020-03-22 20:45:19
222.186.173.215 attackbots
Mar 22 09:28:11 firewall sshd[27868]: Failed password for root from 222.186.173.215 port 39772 ssh2
Mar 22 09:28:21 firewall sshd[27868]: error: maximum authentication attempts exceeded for root from 222.186.173.215 port 39772 ssh2 [preauth]
Mar 22 09:28:21 firewall sshd[27868]: Disconnecting: Too many authentication failures [preauth]
...
2020-03-22 20:38:56
45.238.122.160 attackspambots
2020-03-2204:47:211jFra4-00043d-Gx\<=info@whatsup2013.chH=\(localhost\)[14.186.182.29]:34632P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3647id=9E9B2D7E75A18F3CE0E5AC14D03BB09C@whatsup2013.chT="iamChristina"forynflyg@gmail.comjonathan_stevenson1@hotmail.com2020-03-2204:45:001jFrXn-0003sR-Do\<=info@whatsup2013.chH=045-238-122-160.provecom.com.br\(localhost\)[45.238.122.160]:38099P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3746id=313482D1DA0E20934F4A03BB7FA3DD33@whatsup2013.chT="iamChristina"forzzrxt420@gmail.comdemcatz@yahoo.com2020-03-2204:47:261jFra9-000442-Gu\<=info@whatsup2013.chH=fixed-187-190-45-120.totalplay.net\(localhost\)[187.190.45.120]:57389P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3746id=7277C192994D63D00C0940F83CF509FE@whatsup2013.chT="iamChristina"forjvcan@aol.comtjgj84@gmail.com2020-03-2204:45:101jFrXx-0003tS-BI\<=info@whatsup2013.chH=\(localhost\)[
2020-03-22 20:41:46
179.222.96.70 attack
Mar 22 06:54:11 plusreed sshd[3658]: Invalid user nagios from 179.222.96.70
...
2020-03-22 20:46:06
51.38.71.174 attackspambots
Mar 22 11:48:37 XXX sshd[54188]: Invalid user jm from 51.38.71.174 port 57354
2020-03-22 20:28:02

Recently Reported IPs

2606:4700:10::6814:6163 2606:4700:10::6816:2827 2606:4700:10::6814:8680 110.77.187.59
2606:4700:10::6816:325 2606:4700:10::6816:4235 162.218.28.13 134.35.157.139
2606:4700:10::6816:2825 2606:4700:10::ac43:2870 2606:4700:10::6814:9983 2606:4700:10::6814:5332
2606:4700:10::6816:1972 2606:4700:10::6814:5521 2606:4700:10::6814:5188 2606:4700:10::6814:7457
2606:4700:10::ac43:2892 164.155.74.114 2606:4700:10::6814:6883 2606:4700:10::ac43:1296