Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.6.47.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57266
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.6.47.22.			IN	A

;; AUTHORITY SECTION:
.			123	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:15:05 CST 2023
;; MSG SIZE  rcvd: 104
Host info
22.47.6.104.in-addr.arpa domain name pointer 104-6-47-22.lightspeed.iplsin.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.47.6.104.in-addr.arpa	name = 104-6-47-22.lightspeed.iplsin.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.229.57.3 attack
Jun 24 09:10:42 localhost sshd[835907]: Invalid user marilyn from 111.229.57.3 port 58986
...
2020-06-24 07:48:55
190.74.51.193 attack
20/6/23@16:31:20: FAIL: Alarm-Intrusion address from=190.74.51.193
...
2020-06-24 08:18:54
150.109.57.43 attackspam
SSH Invalid Login
2020-06-24 07:44:13
180.215.223.174 attackbots
Invalid user kodi from 180.215.223.174 port 60300
2020-06-24 07:52:28
118.25.104.200 attackspam
Jun 23 22:51:46 plex sshd[30723]: Invalid user backuppc from 118.25.104.200 port 53232
2020-06-24 08:20:05
49.233.12.222 attackbotsspam
Jun 23 18:32:49 firewall sshd[24992]: Invalid user consultant from 49.233.12.222
Jun 23 18:32:51 firewall sshd[24992]: Failed password for invalid user consultant from 49.233.12.222 port 49492 ssh2
Jun 23 18:34:14 firewall sshd[25040]: Invalid user nikhil from 49.233.12.222
...
2020-06-24 08:13:29
93.75.206.13 attackspam
Jun 24 01:07:11 abendstille sshd\[23463\]: Invalid user cloud_user from 93.75.206.13
Jun 24 01:07:11 abendstille sshd\[23463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.75.206.13
Jun 24 01:07:13 abendstille sshd\[23463\]: Failed password for invalid user cloud_user from 93.75.206.13 port 64115 ssh2
Jun 24 01:08:45 abendstille sshd\[24905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.75.206.13  user=root
Jun 24 01:08:47 abendstille sshd\[24905\]: Failed password for root from 93.75.206.13 port 17800 ssh2
...
2020-06-24 08:12:26
177.185.27.32 attack
Unauthorized connection attempt from IP address 177.185.27.32 on Port 445(SMB)
2020-06-24 08:24:47
120.39.251.232 attack
Jun 23 22:50:07 inter-technics sshd[26679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.39.251.232  user=root
Jun 23 22:50:09 inter-technics sshd[26679]: Failed password for root from 120.39.251.232 port 33087 ssh2
Jun 23 22:51:09 inter-technics sshd[26748]: Invalid user admin from 120.39.251.232 port 40214
Jun 23 22:51:09 inter-technics sshd[26748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.39.251.232
Jun 23 22:51:09 inter-technics sshd[26748]: Invalid user admin from 120.39.251.232 port 40214
Jun 23 22:51:10 inter-technics sshd[26748]: Failed password for invalid user admin from 120.39.251.232 port 40214 ssh2
...
2020-06-24 07:52:54
46.38.145.247 attackbotsspam
2020-06-23T17:32:31.257660linuxbox-skyline auth[131802]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=babu rhost=46.38.145.247
...
2020-06-24 07:58:33
95.9.66.232 attackbotsspam
Automatic report - Banned IP Access
2020-06-24 07:59:38
106.13.203.62 attack
Jun 23 17:29:26 firewall sshd[22715]: Invalid user user from 106.13.203.62
Jun 23 17:29:28 firewall sshd[22715]: Failed password for invalid user user from 106.13.203.62 port 60568 ssh2
Jun 23 17:31:30 firewall sshd[22783]: Invalid user zimbra from 106.13.203.62
...
2020-06-24 08:09:14
218.92.0.199 attack
Jun 23 22:54:58 marvibiene sshd[18314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199  user=root
Jun 23 22:55:00 marvibiene sshd[18314]: Failed password for root from 218.92.0.199 port 35015 ssh2
Jun 23 22:55:03 marvibiene sshd[18314]: Failed password for root from 218.92.0.199 port 35015 ssh2
Jun 23 22:54:58 marvibiene sshd[18314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199  user=root
Jun 23 22:55:00 marvibiene sshd[18314]: Failed password for root from 218.92.0.199 port 35015 ssh2
Jun 23 22:55:03 marvibiene sshd[18314]: Failed password for root from 218.92.0.199 port 35015 ssh2
...
2020-06-24 07:51:32
196.221.149.76 attackspam
Unauthorized connection attempt from IP address 196.221.149.76 on Port 445(SMB)
2020-06-24 08:06:25
211.76.35.196 attackspambots
Port Scan detected!
...
2020-06-24 08:10:19

Recently Reported IPs

104.6.167.168 104.6.110.186 104.6.159.61 104.6.21.190
104.6.174.67 104.6.237.112 104.6.157.199 104.6.216.217
104.6.215.240 104.6.248.11 104.6.211.169 104.6.234.215
104.6.62.39 104.6.156.102 104.60.100.99 104.60.11.17
104.6.85.244 104.60.135.37 104.6.218.111 104.6.208.18