Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.18.76 normal
The hostname for this IP is minecraftworldmap.com
2022-07-23 06:23:40
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.1.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.1.33.			IN	A

;; AUTHORITY SECTION:
.			419	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:29:34 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 33.1.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 33.1.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.234.99.172 attackbots
Aug 12 04:46:48 pornomens sshd\[17283\]: Invalid user mall from 62.234.99.172 port 60054
Aug 12 04:46:48 pornomens sshd\[17283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.99.172
Aug 12 04:46:50 pornomens sshd\[17283\]: Failed password for invalid user mall from 62.234.99.172 port 60054 ssh2
...
2019-08-12 11:30:53
212.21.66.6 attackspam
Aug 12 04:46:11 cvbmail sshd\[22016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.21.66.6  user=root
Aug 12 04:46:14 cvbmail sshd\[22016\]: Failed password for root from 212.21.66.6 port 3620 ssh2
Aug 12 04:46:16 cvbmail sshd\[22016\]: Failed password for root from 212.21.66.6 port 3620 ssh2
2019-08-12 11:46:31
115.68.47.184 attack
Aug 12 05:43:38 dedicated sshd[14159]: Invalid user pv from 115.68.47.184 port 35590
2019-08-12 11:47:04
162.247.74.216 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.216  user=root
Failed password for root from 162.247.74.216 port 49546 ssh2
Failed password for root from 162.247.74.216 port 49546 ssh2
Failed password for root from 162.247.74.216 port 49546 ssh2
Failed password for root from 162.247.74.216 port 49546 ssh2
2019-08-12 11:29:57
104.248.157.14 attack
Aug 12 04:46:55 MK-Soft-Root2 sshd\[9061\]: Invalid user pollo from 104.248.157.14 port 50850
Aug 12 04:46:55 MK-Soft-Root2 sshd\[9061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.157.14
Aug 12 04:46:58 MK-Soft-Root2 sshd\[9061\]: Failed password for invalid user pollo from 104.248.157.14 port 50850 ssh2
...
2019-08-12 11:25:54
217.182.95.250 attackspam
PHI,DEF POST /wp-admin/admin-post.php?page=301bulkoptions
POST /wp-admin/admin-ajax.php?page=301bulkoptions
2019-08-12 11:24:58
23.129.64.193 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.193  user=root
Failed password for root from 23.129.64.193 port 16000 ssh2
Failed password for root from 23.129.64.193 port 16000 ssh2
Failed password for root from 23.129.64.193 port 16000 ssh2
Failed password for root from 23.129.64.193 port 16000 ssh2
2019-08-12 11:54:33
23.129.64.187 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.187  user=root
Failed password for root from 23.129.64.187 port 36435 ssh2
Failed password for root from 23.129.64.187 port 36435 ssh2
Failed password for root from 23.129.64.187 port 36435 ssh2
Failed password for root from 23.129.64.187 port 36435 ssh2
2019-08-12 11:56:26
37.114.173.202 attack
Aug 12 05:47:06 srv-4 sshd\[6492\]: Invalid user admin from 37.114.173.202
Aug 12 05:47:06 srv-4 sshd\[6492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.114.173.202
Aug 12 05:47:08 srv-4 sshd\[6492\]: Failed password for invalid user admin from 37.114.173.202 port 40268 ssh2
...
2019-08-12 11:16:27
202.131.126.142 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.126.142
Failed password for invalid user ubuntu from 202.131.126.142 port 59164 ssh2
Invalid user walter from 202.131.126.142 port 58358
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.126.142
Failed password for invalid user walter from 202.131.126.142 port 58358 ssh2
2019-08-12 11:35:26
113.200.156.180 attackspam
Aug 12 02:41:33 rb06 sshd[24608]: Failed password for invalid user ftp_test from 113.200.156.180 port 25620 ssh2
Aug 12 02:41:34 rb06 sshd[24608]: Received disconnect from 113.200.156.180: 11: Bye Bye [preauth]
Aug 12 02:50:42 rb06 sshd[27385]: Failed password for invalid user tester from 113.200.156.180 port 37472 ssh2
Aug 12 02:50:42 rb06 sshd[27385]: Received disconnect from 113.200.156.180: 11: Bye Bye [preauth]
Aug 12 02:53:14 rb06 sshd[32698]: Failed password for invalid user briana from 113.200.156.180 port 58664 ssh2
Aug 12 02:53:14 rb06 sshd[32698]: Received disconnect from 113.200.156.180: 11: Bye Bye [preauth]
Aug 12 02:55:33 rb06 sshd[27560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.156.180  user=r.r
Aug 12 02:55:35 rb06 sshd[27560]: Failed password for r.r from 113.200.156.180 port 15060 ssh2
Aug 12 02:55:36 rb06 sshd[27560]: Received disconnect from 113.200.156.180: 11: Bye Bye [preauth]
Aug 12 03:00:1........
-------------------------------
2019-08-12 11:17:59
46.105.92.10 attackspam
46.105.92.10 - - [12/Aug/2019:04:46:22 +0200] "GET /1 HTTP/1.1" 404 17035 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:64.0) Gecko/20100101 Firefox/64.0"
46.105.92.10 - - [12/Aug/2019:04:46:24 +0200] "POST /wp-admin/admin-post.php?page=301bulkoptions HTTP/1.1" 403 377 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36"
46.105.92.10 - - [12/Aug/2019:04:46:24 +0200] "POST /wp-admin/admin-ajax.php?page=301bulkoptions HTTP/1.1" 403 377 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36"
46.105.92.10 - - [12/Aug/2019:04:46:24 +0200] "POST / HTTP/1.1" 403 354 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36"
46.105.92.10 - - [12/Aug/2019:04:46:32 +0200] "GET /1 HTTP/1.1" 404 17068 "http://nfsec.pl/1
...
2019-08-12 11:38:42
81.22.45.134 attack
Honeypot hit.
2019-08-12 11:50:43
42.112.27.171 attack
Aug 12 05:22:09 lnxmail61 sshd[27009]: Failed password for uucp from 42.112.27.171 port 38498 ssh2
Aug 12 05:22:09 lnxmail61 sshd[27009]: Failed password for uucp from 42.112.27.171 port 38498 ssh2
2019-08-12 11:33:13
90.157.222.83 attackbotsspam
Aug 11 18:57:05 xb3 sshd[13380]: Address 90.157.222.83 maps to mail.aristotel.si, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Aug 11 18:57:07 xb3 sshd[13380]: Failed password for invalid user chicago from 90.157.222.83 port 35080 ssh2
Aug 11 18:57:07 xb3 sshd[13380]: Received disconnect from 90.157.222.83: 11: Bye Bye [preauth]
Aug 11 19:09:31 xb3 sshd[15186]: Address 90.157.222.83 maps to mail.aristotel.si, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Aug 11 19:09:32 xb3 sshd[15186]: Failed password for invalid user ramu from 90.157.222.83 port 38868 ssh2
Aug 11 19:09:32 xb3 sshd[15186]: Received disconnect from 90.157.222.83: 11: Bye Bye [preauth]
Aug 11 19:14:49 xb3 sshd[15067]: Address 90.157.222.83 maps to mail.aristotel.si, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Aug 11 19:14:51 xb3 sshd[15067]: Failed password for invalid user elias from 90.157.222.83 port 54438 ssh2
Aug 11 19:14:........
-------------------------------
2019-08-12 11:30:20

Recently Reported IPs

104.21.1.26 104.21.1.39 104.21.1.53 104.21.1.73
125.60.17.34 104.21.1.97 104.21.1.84 104.21.1.40
104.21.1.37 104.21.10.12 104.21.10.114 104.21.1.63
104.21.10.125 196.15.2.244 104.21.10.139 104.21.10.147
104.21.10.148 104.21.10.203 104.21.10.161 125.60.43.170