Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.104.22.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22851
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;161.104.22.197.			IN	A

;; AUTHORITY SECTION:
.			404	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070800 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 09 03:05:23 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 197.22.104.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.22.104.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.183.47.96 attack
Brute force attempt
2020-05-09 21:36:51
144.217.34.148 attackspam
144.217.34.148 was recorded 5 times by 5 hosts attempting to connect to the following ports: 3283. Incident counter (4h, 24h, all-time): 5, 15, 2328
2020-05-09 21:13:39
94.102.56.215 attack
ET DROP Dshield Block Listed Source group 1 - port: 1049 proto: UDP cat: Misc Attack
2020-05-09 21:20:01
186.149.46.4 attack
May  9 02:56:50 electroncash sshd[15255]: Failed password for root from 186.149.46.4 port 36102 ssh2
May  9 03:01:16 electroncash sshd[16488]: Invalid user az from 186.149.46.4 port 37350
May  9 03:01:16 electroncash sshd[16488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.149.46.4 
May  9 03:01:16 electroncash sshd[16488]: Invalid user az from 186.149.46.4 port 37350
May  9 03:01:17 electroncash sshd[16488]: Failed password for invalid user az from 186.149.46.4 port 37350 ssh2
...
2020-05-09 21:04:40
181.49.107.180 attack
sshd jail - ssh hack attempt
2020-05-09 21:17:25
185.156.73.52 attackspambots
05/08/2020-22:54:46.272337 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-09 20:50:52
222.186.175.151 attackspambots
May  9 05:56:38 ift sshd\[13761\]: Failed password for root from 222.186.175.151 port 14460 ssh2May  9 05:56:51 ift sshd\[13761\]: Failed password for root from 222.186.175.151 port 14460 ssh2May  9 05:56:56 ift sshd\[13766\]: Failed password for root from 222.186.175.151 port 42930 ssh2May  9 05:56:59 ift sshd\[13766\]: Failed password for root from 222.186.175.151 port 42930 ssh2May  9 05:57:03 ift sshd\[13766\]: Failed password for root from 222.186.175.151 port 42930 ssh2
...
2020-05-09 20:55:14
89.248.168.218 attack
46376/tcp 46205/tcp 46236/tcp...≡ [46200/tcp,46400/tcp]
[2020-04-28/05-08]598pkt,201pt.(tcp)
2020-05-09 21:35:33
216.244.66.227 attackspam
20 attempts against mh-misbehave-ban on plane
2020-05-09 20:56:25
180.71.47.198 attackspam
2020-05-09T02:27:51.348410struts4.enskede.local sshd\[27037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198  user=root
2020-05-09T02:27:55.051396struts4.enskede.local sshd\[27037\]: Failed password for root from 180.71.47.198 port 40304 ssh2
2020-05-09T02:31:48.151592struts4.enskede.local sshd\[27075\]: Invalid user mqm from 180.71.47.198 port 49100
2020-05-09T02:31:48.158636struts4.enskede.local sshd\[27075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198
2020-05-09T02:31:51.665723struts4.enskede.local sshd\[27075\]: Failed password for invalid user mqm from 180.71.47.198 port 49100 ssh2
...
2020-05-09 21:33:48
182.70.253.202 attackspambots
$f2bV_matches
2020-05-09 21:13:18
51.75.4.79 attackspam
prod11
...
2020-05-09 21:27:42
112.85.42.173 attackbotsspam
May  9 04:40:31 home sshd[29658]: Failed password for root from 112.85.42.173 port 53036 ssh2
May  9 04:40:46 home sshd[29658]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 53036 ssh2 [preauth]
May  9 04:40:52 home sshd[29703]: Failed password for root from 112.85.42.173 port 26580 ssh2
...
2020-05-09 21:35:00
58.87.120.53 attackbots
2020-05-09T00:42:38.178234abusebot-5.cloudsearch.cf sshd[25979]: Invalid user xqf from 58.87.120.53 port 47252
2020-05-09T00:42:38.185882abusebot-5.cloudsearch.cf sshd[25979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53
2020-05-09T00:42:38.178234abusebot-5.cloudsearch.cf sshd[25979]: Invalid user xqf from 58.87.120.53 port 47252
2020-05-09T00:42:40.092278abusebot-5.cloudsearch.cf sshd[25979]: Failed password for invalid user xqf from 58.87.120.53 port 47252 ssh2
2020-05-09T00:46:45.379022abusebot-5.cloudsearch.cf sshd[25982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53  user=root
2020-05-09T00:46:47.195057abusebot-5.cloudsearch.cf sshd[25982]: Failed password for root from 58.87.120.53 port 45858 ssh2
2020-05-09T00:50:38.742572abusebot-5.cloudsearch.cf sshd[25988]: Invalid user pk from 58.87.120.53 port 44376
...
2020-05-09 20:47:23
103.145.12.100 attackbots
Brute force attack stopped by firewall
2020-05-09 20:54:11

Recently Reported IPs

95.140.40.93 119.58.245.58 124.185.236.99 70.230.233.76
112.213.87.21 24.154.149.163 122.116.33.240 186.216.71.207
189.139.84.203 167.89.100.27 120.52.93.50 85.106.46.238
14.226.60.32 156.196.173.157 162.243.139.241 27.77.231.83
187.75.69.44 125.160.112.82 81.213.167.181 181.114.154.58