Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 22.112.21.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;22.112.21.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 23:38:01 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 104.21.112.22.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.21.112.22.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.146.40.67 attackspam
Sep 14 22:47:34 SilenceServices sshd[21235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.146.40.67
Sep 14 22:47:36 SilenceServices sshd[21235]: Failed password for invalid user ellort from 190.146.40.67 port 37876 ssh2
Sep 14 22:53:38 SilenceServices sshd[23509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.146.40.67
2019-09-15 11:01:55
178.128.112.98 attack
Sep 15 04:01:56 XXX sshd[62324]: Invalid user ofsaa from 178.128.112.98 port 39166
2019-09-15 11:05:58
89.22.201.221 attackbotsspam
Brute force attempt
2019-09-15 11:14:56
49.247.133.22 attackbots
Sep 15 05:14:14 markkoudstaal sshd[21142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.133.22
Sep 15 05:14:16 markkoudstaal sshd[21142]: Failed password for invalid user csgoserver from 49.247.133.22 port 42528 ssh2
Sep 15 05:19:13 markkoudstaal sshd[21589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.133.22
2019-09-15 11:31:06
112.231.198.38 attackspambots
Sep 14 16:59:17 lcdev sshd\[15194\]: Invalid user pi from 112.231.198.38
Sep 14 16:59:17 lcdev sshd\[15194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.231.198.38
Sep 14 16:59:18 lcdev sshd\[15193\]: Invalid user pi from 112.231.198.38
Sep 14 16:59:18 lcdev sshd\[15193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.231.198.38
Sep 14 16:59:19 lcdev sshd\[15194\]: Failed password for invalid user pi from 112.231.198.38 port 11478 ssh2
2019-09-15 11:35:19
138.68.165.102 attack
Sep 14 09:51:11 php2 sshd\[7697\]: Invalid user lassi from 138.68.165.102
Sep 14 09:51:11 php2 sshd\[7697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.165.102
Sep 14 09:51:13 php2 sshd\[7697\]: Failed password for invalid user lassi from 138.68.165.102 port 48540 ssh2
Sep 14 09:55:32 php2 sshd\[8067\]: Invalid user student9 from 138.68.165.102
Sep 14 09:55:32 php2 sshd\[8067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.165.102
2019-09-15 10:58:49
79.49.226.188 attackbots
Unauthorized access on Port 22 [ssh]
2019-09-15 11:04:59
186.137.123.202 attackspam
Sep 15 04:01:35 XXX sshd[62320]: Invalid user olimex from 186.137.123.202 port 36690
2019-09-15 11:07:51
139.199.21.245 attack
Sep 14 17:12:12 hpm sshd\[11164\]: Invalid user gq from 139.199.21.245
Sep 14 17:12:12 hpm sshd\[11164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.21.245
Sep 14 17:12:14 hpm sshd\[11164\]: Failed password for invalid user gq from 139.199.21.245 port 59463 ssh2
Sep 14 17:16:32 hpm sshd\[11573\]: Invalid user roland from 139.199.21.245
Sep 14 17:16:32 hpm sshd\[11573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.21.245
2019-09-15 11:28:30
110.35.173.100 attackbots
Sep 14 16:55:17 friendsofhawaii sshd\[23087\]: Invalid user admin from 110.35.173.100
Sep 14 16:55:17 friendsofhawaii sshd\[23087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.100
Sep 14 16:55:19 friendsofhawaii sshd\[23087\]: Failed password for invalid user admin from 110.35.173.100 port 60920 ssh2
Sep 14 16:59:51 friendsofhawaii sshd\[23454\]: Invalid user manager from 110.35.173.100
Sep 14 16:59:51 friendsofhawaii sshd\[23454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.100
2019-09-15 11:13:48
193.169.255.140 attackbots
Sep 15 04:39:17 ncomp postfix/smtpd[1881]: warning: unknown[193.169.255.140]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 15 04:49:40 ncomp postfix/smtpd[2190]: warning: unknown[193.169.255.140]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 15 04:59:57 ncomp postfix/smtpd[2336]: warning: unknown[193.169.255.140]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-15 11:08:52
128.199.142.138 attack
Sep 15 04:49:47 rotator sshd\[17537\]: Invalid user linux12345 from 128.199.142.138Sep 15 04:49:49 rotator sshd\[17537\]: Failed password for invalid user linux12345 from 128.199.142.138 port 58822 ssh2Sep 15 04:54:34 rotator sshd\[18305\]: Invalid user sysadmin123 from 128.199.142.138Sep 15 04:54:36 rotator sshd\[18305\]: Failed password for invalid user sysadmin123 from 128.199.142.138 port 43508 ssh2Sep 15 04:59:14 rotator sshd\[19081\]: Invalid user appuser123456 from 128.199.142.138Sep 15 04:59:16 rotator sshd\[19081\]: Failed password for invalid user appuser123456 from 128.199.142.138 port 56428 ssh2
...
2019-09-15 11:30:02
187.119.235.113 attack
Sep 15 02:21:59 XXXXXX sshd[18399]: Invalid user ubnt from 187.119.235.113 port 44911
2019-09-15 11:06:42
190.145.78.66 attack
Sep 15 05:28:29 vps01 sshd[12204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.78.66
Sep 15 05:28:30 vps01 sshd[12204]: Failed password for invalid user 123456 from 190.145.78.66 port 50932 ssh2
2019-09-15 11:29:31
86.101.56.141 attackspam
Sep 14 17:12:43 php1 sshd\[24493\]: Invalid user gertruda from 86.101.56.141
Sep 14 17:12:43 php1 sshd\[24493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.101.56.141
Sep 14 17:12:45 php1 sshd\[24493\]: Failed password for invalid user gertruda from 86.101.56.141 port 50230 ssh2
Sep 14 17:17:10 php1 sshd\[24906\]: Invalid user redmine from 86.101.56.141
Sep 14 17:17:10 php1 sshd\[24906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.101.56.141
2019-09-15 11:17:22

Recently Reported IPs

51.238.229.93 177.205.116.146 75.14.188.192 153.3.42.83
223.47.20.79 208.178.180.137 126.45.172.113 255.30.46.16
181.102.78.55 210.217.63.103 84.90.137.245 119.197.173.103
214.165.196.146 144.89.217.24 216.53.244.24 163.177.63.92
230.240.145.126 49.65.1.47 21.205.35.25 85.102.194.23