Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.54.8.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.54.8.222.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030802 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 07:42:58 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 222.8.54.18.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 222.8.54.18.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.71.235.21 attackbots
Automatic report - XMLRPC Attack
2020-06-29 14:51:41
124.207.98.213 attack
2020-06-29T05:40:48.608438ns386461 sshd\[20804\]: Invalid user mietek from 124.207.98.213 port 12678
2020-06-29T05:40:48.612780ns386461 sshd\[20804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.98.213
2020-06-29T05:40:51.046557ns386461 sshd\[20804\]: Failed password for invalid user mietek from 124.207.98.213 port 12678 ssh2
2020-06-29T05:55:09.863002ns386461 sshd\[1939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.98.213  user=root
2020-06-29T05:55:12.159889ns386461 sshd\[1939\]: Failed password for root from 124.207.98.213 port 13849 ssh2
...
2020-06-29 15:04:15
36.89.163.178 attackspambots
SSH brute-force attempt
2020-06-29 14:21:18
187.167.205.223 attackspam
Automatic report - Port Scan Attack
2020-06-29 14:31:52
181.66.129.185 attack
1593402952 - 06/29/2020 05:55:52 Host: 181.66.129.185/181.66.129.185 Port: 445 TCP Blocked
2020-06-29 14:32:29
70.184.222.164 attackspam
Automatically reported by fail2ban report script (powermetal_old)
2020-06-29 14:34:20
14.181.133.192 attack
1593402923 - 06/29/2020 05:55:23 Host: 14.181.133.192/14.181.133.192 Port: 445 TCP Blocked
2020-06-29 14:56:20
115.159.124.199 attack
Invalid user webmin from 115.159.124.199 port 35536
2020-06-29 14:25:17
50.236.62.30 attack
Fail2Ban - SSH Bruteforce Attempt
2020-06-29 14:28:24
192.34.63.128 attack
Jun 29 06:51:27 marvibiene sshd[19488]: Invalid user natasha from 192.34.63.128 port 59630
Jun 29 06:51:27 marvibiene sshd[19488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.34.63.128
Jun 29 06:51:27 marvibiene sshd[19488]: Invalid user natasha from 192.34.63.128 port 59630
Jun 29 06:51:30 marvibiene sshd[19488]: Failed password for invalid user natasha from 192.34.63.128 port 59630 ssh2
...
2020-06-29 15:04:33
106.51.80.198 attackbotsspam
Invalid user family from 106.51.80.198 port 53348
2020-06-29 15:03:36
45.168.167.39 attackspam
unauthorized connection attempt
2020-06-29 14:57:24
14.136.104.38 attackbotsspam
Jun 28 21:52:33 server1 sshd\[5395\]: Invalid user leticia from 14.136.104.38
Jun 28 21:52:33 server1 sshd\[5395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.136.104.38 
Jun 28 21:52:35 server1 sshd\[5395\]: Failed password for invalid user leticia from 14.136.104.38 port 7169 ssh2
Jun 28 21:55:31 server1 sshd\[7451\]: Invalid user hand from 14.136.104.38
Jun 28 21:55:31 server1 sshd\[7451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.136.104.38 
...
2020-06-29 14:34:50
185.87.50.77 attackbotsspam
Invalid user me from 185.87.50.77 port 50080
2020-06-29 14:36:41
165.22.35.21 attackbots
Brute-force general attack.
2020-06-29 14:29:50

Recently Reported IPs

145.62.168.250 136.71.26.165 117.100.153.80 131.162.75.151
149.25.10.139 123.213.6.173 124.64.23.36 203.241.184.99
19.220.188.158 8.254.191.109 126.148.156.134 120.107.201.138
50.136.204.210 73.214.80.79 195.184.207.103 169.158.124.71
89.48.238.214 249.80.120.20 252.29.74.18 99.182.78.155