Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.22.119.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.22.119.51.			IN	A

;; AUTHORITY SECTION:
.			121	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021080101 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 02 04:24:57 CST 2021
;; MSG SIZE  rcvd: 104
Host info
51.119.22.2.in-addr.arpa domain name pointer a2-22-119-51.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.119.22.2.in-addr.arpa	name = a2-22-119-51.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.181.68 attack
2019-12-06T10:05:49.618639shield sshd\[13028\]: Invalid user 123 from 106.13.181.68 port 55584
2019-12-06T10:05:49.622812shield sshd\[13028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.68
2019-12-06T10:05:52.087601shield sshd\[13028\]: Failed password for invalid user 123 from 106.13.181.68 port 55584 ssh2
2019-12-06T10:13:43.802341shield sshd\[14217\]: Invalid user myshell1234 from 106.13.181.68 port 33870
2019-12-06T10:13:43.806653shield sshd\[14217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.68
2019-12-06 18:23:23
148.76.108.146 attackbotsspam
Dec  6 12:49:08 vtv3 sshd[18153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.76.108.146 
Dec  6 12:49:11 vtv3 sshd[18153]: Failed password for invalid user server from 148.76.108.146 port 56672 ssh2
Dec  6 12:54:13 vtv3 sshd[20506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.76.108.146 
Dec  6 13:06:58 vtv3 sshd[27027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.76.108.146 
Dec  6 13:07:00 vtv3 sshd[27027]: Failed password for invalid user tan from 148.76.108.146 port 59150 ssh2
Dec  6 13:12:17 vtv3 sshd[29505]: Failed password for root from 148.76.108.146 port 41154 ssh2
2019-12-06 18:13:31
212.91.121.114 attackspambots
Mail sent to address hacked/leaked from Destructoid
2019-12-06 18:13:06
179.96.177.27 attackspam
Port Scan
2019-12-06 17:59:25
212.47.238.207 attackspambots
Dec  6 04:37:06 linuxvps sshd\[18636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.238.207  user=root
Dec  6 04:37:07 linuxvps sshd\[18636\]: Failed password for root from 212.47.238.207 port 45924 ssh2
Dec  6 04:43:06 linuxvps sshd\[21981\]: Invalid user muhayat from 212.47.238.207
Dec  6 04:43:06 linuxvps sshd\[21981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.238.207
Dec  6 04:43:07 linuxvps sshd\[21981\]: Failed password for invalid user muhayat from 212.47.238.207 port 55660 ssh2
2019-12-06 17:54:22
140.143.57.159 attackbots
$f2bV_matches
2019-12-06 18:11:34
80.211.11.41 attack
Dec  5 21:27:54 tdfoods sshd\[23555\]: Invalid user test from 80.211.11.41
Dec  5 21:27:54 tdfoods sshd\[23555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.11.41
Dec  5 21:27:57 tdfoods sshd\[23555\]: Failed password for invalid user test from 80.211.11.41 port 60314 ssh2
Dec  5 21:33:48 tdfoods sshd\[24116\]: Invalid user smmsp from 80.211.11.41
Dec  5 21:33:48 tdfoods sshd\[24116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.11.41
2019-12-06 18:08:57
217.72.1.254 attackspambots
postfix
2019-12-06 18:21:49
222.186.180.147 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
Failed password for root from 222.186.180.147 port 31878 ssh2
Failed password for root from 222.186.180.147 port 31878 ssh2
Failed password for root from 222.186.180.147 port 31878 ssh2
Failed password for root from 222.186.180.147 port 31878 ssh2
2019-12-06 18:10:17
80.211.237.180 attackspam
2019-12-06T10:20:03.074513abusebot-8.cloudsearch.cf sshd\[14009\]: Invalid user ailar from 80.211.237.180 port 49585
2019-12-06 18:23:03
149.202.56.194 attackbotsspam
Dec  6 00:11:38 tdfoods sshd\[7302\]: Invalid user tery from 149.202.56.194
Dec  6 00:11:38 tdfoods sshd\[7302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.ip-149-202-56.eu
Dec  6 00:11:41 tdfoods sshd\[7302\]: Failed password for invalid user tery from 149.202.56.194 port 45758 ssh2
Dec  6 00:16:53 tdfoods sshd\[7786\]: Invalid user zhenyan from 149.202.56.194
Dec  6 00:16:53 tdfoods sshd\[7786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.ip-149-202-56.eu
2019-12-06 18:26:07
177.84.91.68 attackspam
Automatic report - Port Scan Attack
2019-12-06 17:50:59
150.109.6.70 attack
2019-12-06T10:19:21.363295abusebot-8.cloudsearch.cf sshd\[14003\]: Invalid user ddddd from 150.109.6.70 port 33836
2019-12-06 18:28:43
122.7.28.65 attackspambots
Dec  5 01:01:02 esmtp postfix/smtpd[21260]: lost connection after AUTH from unknown[122.7.28.65]
Dec  5 01:01:06 esmtp postfix/smtpd[21260]: lost connection after AUTH from unknown[122.7.28.65]
Dec  5 01:01:08 esmtp postfix/smtpd[21260]: lost connection after AUTH from unknown[122.7.28.65]
Dec  5 01:01:12 esmtp postfix/smtpd[21260]: lost connection after AUTH from unknown[122.7.28.65]
Dec  5 01:01:18 esmtp postfix/smtpd[21260]: lost connection after AUTH from unknown[122.7.28.65]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.7.28.65
2019-12-06 18:07:26
150.95.212.72 attackbotsspam
Dec  6 00:02:23 kapalua sshd\[31752\]: Invalid user admin from 150.95.212.72
Dec  6 00:02:23 kapalua sshd\[31752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-212-72.873a.static.cnode.io
Dec  6 00:02:24 kapalua sshd\[31752\]: Failed password for invalid user admin from 150.95.212.72 port 57514 ssh2
Dec  6 00:09:08 kapalua sshd\[32586\]: Invalid user lea from 150.95.212.72
Dec  6 00:09:08 kapalua sshd\[32586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-212-72.873a.static.cnode.io
2019-12-06 18:20:13

Recently Reported IPs

189.213.228.237 144.217.171.217 144.217.171.208 178.175.132.170
77.222.117.176 23.224.99.226 122.252.239.122 68.183.118.244
59.19.129.14 59.19.129.65 52.37.221.72 220.168.115.136
159.89.115.95 54.236.22.56 114.125.230.139 59.124.75.153
160.202.160.0 203.177.60.187 183.63.153.92 45.146.165.159