Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Clifton

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.131.21.222 attackbots
firewall-block, port(s): 8088/tcp
2020-10-09 08:00:34
104.131.21.222 attackspambots
" "
2020-10-09 00:35:21
104.131.21.222 attack
[portscan] tcp/22 [SSH]
in blocklist.de:'listed [ssh]'
*(RWIN=65535)(10080947)
2020-10-08 16:32:07
104.131.218.208 attackspam
Jun  7 17:40:07 *** sshd[29360]: User root from 104.131.218.208 not allowed because not listed in AllowUsers
2020-06-08 01:45:15
104.131.217.93 attackbots
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-20 02:50:09
104.131.216.62 attackspam
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-20 01:53:27
104.131.217.56 attackbots
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-19 22:32:17
104.131.217.66 attackspambots
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-18 02:34:37
104.131.217.187 attackspambots
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-18 02:18:07
104.131.216.136 attack
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-17 20:36:08
104.131.218.29 attackbotsspam
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-05 05:08:47
104.131.215.120 attackspambots
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-05 04:42:26
104.131.219.124 attackbotsspam
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-05 03:09:17
104.131.217.43 attackbots
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-03-30 03:04:08
104.131.216.33 attackbots
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-03-30 01:38:07
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.131.21.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62783
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.131.21.11.			IN	A

;; AUTHORITY SECTION:
.			181	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052300 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 24 01:25:04 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 11.21.131.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.21.131.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.56.81.238 attackspam
Invalid user pi from 58.56.81.238 port 38774
2019-08-01 15:58:55
190.90.8.254 attackbots
Aug  1 07:05:43 www1 sshd\[7432\]: Invalid user francis from 190.90.8.254Aug  1 07:05:45 www1 sshd\[7432\]: Failed password for invalid user francis from 190.90.8.254 port 55862 ssh2Aug  1 07:08:50 www1 sshd\[7656\]: Invalid user gmodserver from 190.90.8.254Aug  1 07:08:52 www1 sshd\[7656\]: Failed password for invalid user gmodserver from 190.90.8.254 port 59218 ssh2Aug  1 07:09:23 www1 sshd\[7720\]: Invalid user xd from 190.90.8.254Aug  1 07:09:25 www1 sshd\[7720\]: Failed password for invalid user xd from 190.90.8.254 port 33794 ssh2
...
2019-08-01 15:53:45
209.17.96.226 attack
2019-08-01T03:29:00.008Z CLOSE host=209.17.96.226 port=60295 fd=4 time=32.034 bytes=503
...
2019-08-01 15:17:04
183.157.207.230 attack
Aug  1 12:23:50 areeb-Workstation sshd\[26205\]: Invalid user wade from 183.157.207.230
Aug  1 12:23:50 areeb-Workstation sshd\[26205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.157.207.230
Aug  1 12:23:51 areeb-Workstation sshd\[26205\]: Failed password for invalid user wade from 183.157.207.230 port 41890 ssh2
...
2019-08-01 15:51:56
118.24.21.19 attackspam
Aug  1 08:38:45 pornomens sshd\[5994\]: Invalid user secret from 118.24.21.19 port 55122
Aug  1 08:38:45 pornomens sshd\[5994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.21.19
Aug  1 08:38:47 pornomens sshd\[5994\]: Failed password for invalid user secret from 118.24.21.19 port 55122 ssh2
...
2019-08-01 15:45:20
62.28.34.125 attackbotsspam
Aug  1 09:33:53 eventyay sshd[5818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.34.125
Aug  1 09:33:55 eventyay sshd[5818]: Failed password for invalid user ftpuser from 62.28.34.125 port 31045 ssh2
Aug  1 09:41:27 eventyay sshd[7578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.34.125
...
2019-08-01 15:43:20
90.210.171.107 attackbots
Jul 31 20:29:59 cac1d2 sshd\[14325\]: Invalid user ofsaa from 90.210.171.107 port 51424
Jul 31 20:29:59 cac1d2 sshd\[14325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.210.171.107
Jul 31 20:30:02 cac1d2 sshd\[14325\]: Failed password for invalid user ofsaa from 90.210.171.107 port 51424 ssh2
...
2019-08-01 15:08:12
60.50.123.9 attackspam
Aug  1 02:40:07 TORMINT sshd\[24055\]: Invalid user finance from 60.50.123.9
Aug  1 02:40:07 TORMINT sshd\[24055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.50.123.9
Aug  1 02:40:09 TORMINT sshd\[24055\]: Failed password for invalid user finance from 60.50.123.9 port 55580 ssh2
...
2019-08-01 15:19:38
68.48.240.245 attackbots
Tried sshing with brute force.
2019-08-01 15:11:12
23.129.64.186 attackspam
[ssh] SSH attack
2019-08-01 15:14:37
5.253.19.70 attackspambots
Automatic report - Banned IP Access
2019-08-01 15:37:36
162.247.74.213 attackbotsspam
Aug 01 02:19:45 askasleikir sshd[15795]: Failed password for invalid user administrator from 162.247.74.213 port 40718 ssh2
Aug 01 02:19:50 askasleikir sshd[15805]: Failed password for invalid user NetLinx from 162.247.74.213 port 43260 ssh2
2019-08-01 15:46:44
85.246.129.162 attackbots
2019-08-01T06:40:48.551941abusebot-8.cloudsearch.cf sshd\[16782\]: Invalid user testuser from 85.246.129.162 port 42834
2019-08-01 15:08:34
92.63.194.90 attackbotsspam
Aug  1 12:17:15 areeb-Workstation sshd\[25030\]: Invalid user admin from 92.63.194.90
Aug  1 12:17:15 areeb-Workstation sshd\[25030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90
Aug  1 12:17:17 areeb-Workstation sshd\[25030\]: Failed password for invalid user admin from 92.63.194.90 port 42384 ssh2
...
2019-08-01 15:28:55
27.76.31.149 attackbots
lua dao
2019-08-01 15:15:40

Recently Reported IPs

104.131.199.12 104.131.214.7 104.131.25.176 104.131.27.158
104.131.36.247 104.131.55.39 104.131.56.122 104.131.56.147
104.131.6.187 104.131.73.239 104.131.8.148 104.131.84.147
104.131.86.223 104.131.87.232 104.131.88.155 104.131.88.73
104.131.91.135 104.131.92.171 104.131.92.222 104.131.92.86