Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Edmonton

Region: Alberta

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.246.222.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.246.222.14.			IN	A

;; AUTHORITY SECTION:
.			258	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092202 1800 900 604800 86400

;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 23 08:08:13 CST 2020
;; MSG SIZE  rcvd: 118
Host info
14.222.246.104.in-addr.arpa domain name pointer 104-246-222-14.cpe.teksavvy.com.
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
14.222.246.104.in-addr.arpa	name = 104-246-222-14.cpe.teksavvy.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
102.68.17.48 attackbots
Invalid user yh from 102.68.17.48 port 52032
2020-05-01 15:50:49
182.61.10.28 attackbots
Invalid user gabriel from 182.61.10.28 port 52706
2020-05-01 15:37:15
47.90.75.80 attackbotsspam
Invalid user ben from 47.90.75.80 port 56560
2020-05-01 15:58:34
54.39.96.155 attack
$f2bV_matches
2020-05-01 15:55:14
51.75.255.250 attack
Invalid user ts3server from 51.75.255.250 port 47408
2020-05-01 15:56:54
49.232.131.80 attack
Apr 30 19:43:14 kapalua sshd\[3615\]: Invalid user ck from 49.232.131.80
Apr 30 19:43:14 kapalua sshd\[3615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.131.80
Apr 30 19:43:16 kapalua sshd\[3615\]: Failed password for invalid user ck from 49.232.131.80 port 40526 ssh2
Apr 30 19:47:24 kapalua sshd\[4059\]: Invalid user postgres from 49.232.131.80
Apr 30 19:47:24 kapalua sshd\[4059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.131.80
2020-05-01 15:57:58
1.245.61.144 attack
Invalid user admin from 1.245.61.144 port 23173
2020-05-01 15:30:31
103.25.21.173 attack
Invalid user backups from 103.25.21.173 port 53326
2020-05-01 15:50:32
59.80.40.147 attack
Invalid user testuser1 from 59.80.40.147 port 53134
2020-05-01 15:54:16
183.224.38.56 attackspambots
Invalid user admin from 183.224.38.56 port 54238
2020-05-01 15:36:23
5.135.158.228 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-05-01 15:30:02
27.221.97.3 attackbots
Invalid user amazonas from 27.221.97.3 port 41676
2020-05-01 15:28:35
193.112.107.200 attackbotsspam
hit -> srv3:22
2020-05-01 15:34:42
37.187.22.227 attackbots
Invalid user deploy from 37.187.22.227 port 57508
2020-05-01 15:28:15
81.130.234.235 attackspam
May  1 07:17:46 vmd26974 sshd[22640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.130.234.235
May  1 07:17:48 vmd26974 sshd[22640]: Failed password for invalid user nicholas from 81.130.234.235 port 49487 ssh2
...
2020-05-01 15:52:08

Recently Reported IPs

38.135.46.63 41.199.29.92 61.8.113.205 108.136.237.60
87.14.153.162 173.236.146.172 152.232.206.183 174.40.27.203
110.115.243.122 112.226.114.41 51.222.82.119 221.159.93.171
114.157.39.41 13.52.18.206 105.128.252.14 42.113.140.150
75.243.94.72 117.108.70.127 85.157.43.155 96.2.11.234