Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.14.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5204
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.14.234.			IN	A

;; AUTHORITY SECTION:
.			456	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:11:25 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 234.14.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.14.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.217.94.19 attack
Brute force SSH attack
2019-12-24 07:41:03
185.234.219.82 attackspambots
Dec 23 17:47:43 web1 postfix/smtpd[15487]: warning: unknown[185.234.219.82]: SASL LOGIN authentication failed: authentication failure
...
2019-12-24 08:01:17
185.84.6.103 attackbotsspam
SSH Bruteforce attempt
2019-12-24 07:55:16
222.186.175.202 attackspam
Dec 24 00:31:59 ns3110291 sshd\[6961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Dec 24 00:32:01 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
Dec 24 00:32:04 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
Dec 24 00:32:07 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
Dec 24 00:32:10 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
...
2019-12-24 07:40:38
223.197.125.10 attackspam
Dec 24 06:21:37 itv-usvr-02 sshd[8207]: Invalid user zhouh from 223.197.125.10 port 57346
Dec 24 06:21:37 itv-usvr-02 sshd[8207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.125.10
Dec 24 06:21:37 itv-usvr-02 sshd[8207]: Invalid user zhouh from 223.197.125.10 port 57346
Dec 24 06:21:39 itv-usvr-02 sshd[8207]: Failed password for invalid user zhouh from 223.197.125.10 port 57346 ssh2
Dec 24 06:29:22 itv-usvr-02 sshd[8459]: Invalid user brengle from 223.197.125.10 port 47196
2019-12-24 07:41:33
46.101.224.184 attackspam
$f2bV_matches
2019-12-24 07:46:37
89.248.172.85 attackbots
12/23/2019-18:14:47.048014 89.248.172.85 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-24 07:23:59
99.166.104.215 attackbotsspam
Dec 23 22:47:44 thevastnessof sshd[7501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.166.104.215
...
2019-12-24 08:01:44
91.240.86.223 attackspambots
Dec 23 23:39:49 l02a sshd[30035]: Invalid user gemma from 91.240.86.223
Dec 23 23:39:49 l02a sshd[30035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.240.86.223 
Dec 23 23:39:49 l02a sshd[30035]: Invalid user gemma from 91.240.86.223
Dec 23 23:39:51 l02a sshd[30035]: Failed password for invalid user gemma from 91.240.86.223 port 39698 ssh2
2019-12-24 07:54:16
46.38.144.17 attackspam
Dec 24 00:23:32 webserver postfix/smtpd\[17544\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 00:24:58 webserver postfix/smtpd\[17542\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 00:26:24 webserver postfix/smtpd\[17542\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 00:27:56 webserver postfix/smtpd\[15799\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 00:29:25 webserver postfix/smtpd\[17544\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-24 07:44:41
46.182.6.40 attackspambots
fail2ban - Attack against Apache (too many 404s)
2019-12-24 07:28:06
58.87.78.55 attackbots
Dec 23 22:06:35 h2065291 sshd[22033]: Invalid user server from 58.87.78.55
Dec 23 22:06:35 h2065291 sshd[22033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.78.55 
Dec 23 22:06:37 h2065291 sshd[22033]: Failed password for invalid user server from 58.87.78.55 port 58974 ssh2
Dec 23 22:06:37 h2065291 sshd[22033]: Received disconnect from 58.87.78.55: 11: Bye Bye [preauth]
Dec 23 22:16:46 h2065291 sshd[22122]: Invalid user ronzoni from 58.87.78.55
Dec 23 22:16:46 h2065291 sshd[22122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.78.55 
Dec 23 22:16:48 h2065291 sshd[22122]: Failed password for invalid user ronzoni from 58.87.78.55 port 56102 ssh2
Dec 23 22:16:49 h2065291 sshd[22122]: Received disconnect from 58.87.78.55: 11: Bye Bye [preauth]
Dec 23 22:19:20 h2065291 sshd[22177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.78.5........
-------------------------------
2019-12-24 08:00:59
110.35.173.103 attackbots
SSH-BruteForce
2019-12-24 07:33:03
112.196.169.126 attack
Dec 23 23:41:13 srv-ubuntu-dev3 sshd[14467]: Invalid user server from 112.196.169.126
Dec 23 23:41:14 srv-ubuntu-dev3 sshd[14467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.169.126
Dec 23 23:41:13 srv-ubuntu-dev3 sshd[14467]: Invalid user server from 112.196.169.126
Dec 23 23:41:15 srv-ubuntu-dev3 sshd[14467]: Failed password for invalid user server from 112.196.169.126 port 50953 ssh2
Dec 23 23:43:34 srv-ubuntu-dev3 sshd[14652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.169.126  user=root
Dec 23 23:43:36 srv-ubuntu-dev3 sshd[14652]: Failed password for root from 112.196.169.126 port 60337 ssh2
Dec 23 23:45:57 srv-ubuntu-dev3 sshd[14849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.169.126  user=root
Dec 23 23:45:58 srv-ubuntu-dev3 sshd[14849]: Failed password for root from 112.196.169.126 port 41486 ssh2
Dec 23 23:48:18 srv-ubu
...
2019-12-24 07:38:19
150.136.133.20 attackbots
Dec 23 23:28:19 pl2server sshd[13806]: Invalid user paulik from 150.136.133.20
Dec 23 23:28:19 pl2server sshd[13806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.133.20
Dec 23 23:28:21 pl2server sshd[13806]: Failed password for invalid user paulik from 150.136.133.20 port 53592 ssh2
Dec 23 23:28:21 pl2server sshd[13806]: Received disconnect from 150.136.133.20: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=150.136.133.20
2019-12-24 07:57:20

Recently Reported IPs

104.21.14.217 104.21.14.214 104.21.67.247 104.21.14.198
104.21.14.240 104.21.14.25 104.21.14.36 104.21.14.242
104.21.14.39 104.21.14.247 104.21.67.252 104.21.14.249
104.21.14.244 104.21.14.253 104.21.14.34 104.21.14.241
104.21.14.40 104.21.14.47 104.21.67.29 104.21.14.55