Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.13.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.13.157.			IN	A

;; AUTHORITY SECTION:
.			466	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 17:51:44 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 157.13.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.13.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.137.233.125 attack
Mar  3 05:59:38 debian-2gb-nbg1-2 kernel: \[5470758.400138\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.137.233.125 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=29397 PROTO=TCP SPT=41717 DPT=4005 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-03 13:00:16
14.177.96.224 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-03-03 13:21:22
41.95.192.127 attackspambots
Mar  3 06:19:06 lnxded63 sshd[31390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.95.192.127
Mar  3 06:19:06 lnxded63 sshd[31390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.95.192.127
2020-03-03 13:22:32
49.231.222.1 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 13:14:13
187.178.144.107 attack
Automatic report - Port Scan Attack
2020-03-03 13:19:25
210.183.21.48 attackspam
Mar  3 05:59:13 dedicated sshd[19532]: Invalid user liangying from 210.183.21.48 port 11352
Mar  3 05:59:16 dedicated sshd[19532]: Failed password for invalid user liangying from 210.183.21.48 port 11352 ssh2
Mar  3 05:59:13 dedicated sshd[19532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.183.21.48 
Mar  3 05:59:13 dedicated sshd[19532]: Invalid user liangying from 210.183.21.48 port 11352
Mar  3 05:59:16 dedicated sshd[19532]: Failed password for invalid user liangying from 210.183.21.48 port 11352 ssh2
2020-03-03 13:15:38
138.68.237.12 attackspam
Mar  2 18:50:35 wbs sshd\[4505\]: Invalid user administrator from 138.68.237.12
Mar  2 18:50:35 wbs sshd\[4505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wsddos1.preview-wsd.com
Mar  2 18:50:37 wbs sshd\[4505\]: Failed password for invalid user administrator from 138.68.237.12 port 39966 ssh2
Mar  2 18:58:46 wbs sshd\[5290\]: Invalid user ubuntu from 138.68.237.12
Mar  2 18:58:46 wbs sshd\[5290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wsddos1.preview-wsd.com
2020-03-03 13:42:05
36.68.238.65 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 13:37:25
27.2.225.26 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 13:27:25
45.143.223.175 spamattack
[2020/03/03 09:13:32] [45.143.223.175:11953] User administrator@luxnetcorp.com.tw login failed.
[2020/03/03 09:13:32] [45.143.223.175:11954] User user06@luxnetcorp.com.tw login failed.
[2020/03/03 09:13:32] [45.143.223.175:11955] User office@luxnetcorp.com.tw login failed.
[2020/03/03 09:13:32] [45.143.223.175:11958] User host@luxnetcorp.com.tw login failed.
[2020/03/03 09:13:32] [45.143.223.175:11959] User guest@luxnetcorp.com.tw login failed.
[2020/03/03 09:13:33] [45.143.223.175:11962] User user05@luxnetcorp.com.tw login failed.
[2020/03/03 09:13:33] [45.143.223.175:11963] User user@luxnetcorp.com.tw login failed.
2020-03-03 10:19:16
94.102.51.79 attackspambots
Lines containing failures of 94.102.51.79
Mar  2 22:22:21 f sshd[9854]: Invalid user admin from 94.102.51.79 port 40598
Mar  2 22:22:21 f sshd[9854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.102.51.79
Mar  2 22:22:23 f sshd[9854]: Failed password for invalid user admin from 94.102.51.79 port 40598 ssh2
Mar  2 22:22:24 f sshd[9854]: Received disconnect from 94.102.51.79 port 40598:11: Normal Shutdown [preauth]
Mar  2 22:22:24 f sshd[9854]: Disconnected from 94.102.51.79 port 40598 [preauth]
Mar  2 22:25:31 f sshd[9905]: Invalid user oracle from 94.102.51.79 port 49538
Mar  2 22:25:31 f sshd[9905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.102.51.79
Mar  2 22:25:33 f sshd[9905]: Failed password for invalid user oracle from 94.102.51.79 port 49538 ssh2
Mar  2 22:25:33 f sshd[9905]: Received disconnect from 94.102.51.79 port 49538:11: Normal Shutdown [preauth]
Mar  2 22:25:33 f........
------------------------------
2020-03-03 13:30:13
209.17.96.26 attackspam
Automatic report - Banned IP Access
2020-03-03 13:26:38
92.116.132.209 attackspambots
Automatic report - Banned IP Access
2020-03-03 13:31:26
51.79.68.147 attackbots
Mar  3 05:49:56 vps691689 sshd[2427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.68.147
Mar  3 05:49:59 vps691689 sshd[2427]: Failed password for invalid user sftptest from 51.79.68.147 port 49712 ssh2
...
2020-03-03 13:20:55
36.71.235.234 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 13:23:12

Recently Reported IPs

104.21.13.155 104.21.13.16 104.21.13.162 243.101.3.90
104.21.13.163 104.21.13.166 104.21.13.171 104.21.13.174
104.21.13.176 104.21.13.178 104.21.13.179 104.21.13.185
104.21.13.188 207.230.187.169 104.21.13.190 104.21.13.192
104.21.13.194 104.21.13.197 104.21.13.198 0.125.7.104