Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.23.233 spam
https://www.projecthoneypot.org/ip_104.21.23.233
https://multirbl.valli.org/lookup/104.21.23.233.html
https://cleantalk.org/blacklists/104.21.23.233#anc140146
2022-12-29 00:19:00
104.21.23.233 spam
https://www.projecthoneypot.org/ip_104.21.23.233
https://multirbl.valli.org/lookup/104.21.23.233.html
https://cleantalk.org/blacklists/104.21.23.233#anc140146
2022-12-29 00:13:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.2.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7203
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.2.47.			IN	A

;; AUTHORITY SECTION:
.			246	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:14:55 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 47.2.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 47.2.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.9.3.48 attackbots
Sep 19 11:29:23 lcprod sshd\[21637\]: Invalid user mhlee from 185.9.3.48
Sep 19 11:29:23 lcprod sshd\[21637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185-9-3-48.jallabredband.se
Sep 19 11:29:25 lcprod sshd\[21637\]: Failed password for invalid user mhlee from 185.9.3.48 port 54846 ssh2
Sep 19 11:33:43 lcprod sshd\[22019\]: Invalid user 123456 from 185.9.3.48
Sep 19 11:33:43 lcprod sshd\[22019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185-9-3-48.jallabredband.se
2019-09-20 05:44:36
122.191.218.199 attackspambots
" "
2019-09-20 05:59:28
116.226.249.233 attackspam
Unauthorized connection attempt from IP address 116.226.249.233 on Port 445(SMB)
2019-09-20 05:35:20
95.58.194.143 attack
Sep 19 11:52:28 lcdev sshd\[19172\]: Invalid user dx from 95.58.194.143
Sep 19 11:52:28 lcdev sshd\[19172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.58.194.143
Sep 19 11:52:29 lcdev sshd\[19172\]: Failed password for invalid user dx from 95.58.194.143 port 46680 ssh2
Sep 19 11:56:29 lcdev sshd\[19562\]: Invalid user oracle from 95.58.194.143
Sep 19 11:56:29 lcdev sshd\[19562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.58.194.143
2019-09-20 05:57:26
191.103.252.161 attack
Unauthorized connection attempt from IP address 191.103.252.161 on Port 445(SMB)
2019-09-20 05:51:53
132.232.40.86 attack
Sep 19 23:01:35 vps01 sshd[12112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.40.86
Sep 19 23:01:36 vps01 sshd[12112]: Failed password for invalid user wwwrun from 132.232.40.86 port 56332 ssh2
2019-09-20 05:36:55
159.89.184.25 attack
xmlrpc attack
2019-09-20 05:32:12
190.252.253.108 attackspam
Sep 19 21:03:11 hcbbdb sshd\[13542\]: Invalid user mscuser from 190.252.253.108
Sep 19 21:03:11 hcbbdb sshd\[13542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.252.253.108
Sep 19 21:03:13 hcbbdb sshd\[13542\]: Failed password for invalid user mscuser from 190.252.253.108 port 34644 ssh2
Sep 19 21:11:23 hcbbdb sshd\[14449\]: Invalid user oracle from 190.252.253.108
Sep 19 21:11:23 hcbbdb sshd\[14449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.252.253.108
2019-09-20 05:35:03
116.203.49.80 attack
Sep 20 00:52:51 www sshd\[30870\]: Invalid user door from 116.203.49.80Sep 20 00:52:53 www sshd\[30870\]: Failed password for invalid user door from 116.203.49.80 port 40914 ssh2Sep 20 00:56:56 www sshd\[31011\]: Invalid user sonny from 116.203.49.80
...
2019-09-20 05:58:30
192.114.71.89 attackbotsspam
Unauthorized connection attempt from IP address 192.114.71.89 on Port 3389(RDP)
2019-09-20 06:04:22
68.183.213.39 attack
Sep 19 20:56:04 h2065291 sshd[3221]: Invalid user xxxxxx from 68.183.213.39
Sep 19 20:56:04 h2065291 sshd[3221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.213.39 
Sep 19 20:56:06 h2065291 sshd[3221]: Failed password for invalid user xxxxxx from 68.183.213.39 port 48950 ssh2
Sep 19 20:56:06 h2065291 sshd[3221]: Received disconnect from 68.183.213.39: 11: Bye Bye [preauth]
Sep 19 21:11:25 h2065291 sshd[3282]: Invalid user abeler from 68.183.213.39
Sep 19 21:11:25 h2065291 sshd[3282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.213.39 
Sep 19 21:11:27 h2065291 sshd[3282]: Failed password for invalid user abeler from 68.183.213.39 port 44622 ssh2
Sep 19 21:11:27 h2065291 sshd[3282]: Received disconnect from 68.183.213.39: 11: Bye Bye [preauth]
Sep 19 21:15:19 h2065291 sshd[3307]: Invalid user sybase from 68.183.213.39
Sep 19 21:15:19 h2065291 sshd[3307]: pam_unix(sshd:aut........
-------------------------------
2019-09-20 05:37:31
121.134.159.21 attackbotsspam
Sep 19 17:59:19 xtremcommunity sshd\[262065\]: Invalid user co from 121.134.159.21 port 37070
Sep 19 17:59:19 xtremcommunity sshd\[262065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
Sep 19 17:59:21 xtremcommunity sshd\[262065\]: Failed password for invalid user co from 121.134.159.21 port 37070 ssh2
Sep 19 18:04:09 xtremcommunity sshd\[262219\]: Invalid user press from 121.134.159.21 port 50778
Sep 19 18:04:09 xtremcommunity sshd\[262219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
...
2019-09-20 06:09:10
186.211.98.75 attackspambots
Unauthorized connection attempt from IP address 186.211.98.75 on Port 445(SMB)
2019-09-20 05:59:12
142.4.119.230 attackspam
Unauthorized connection attempt from IP address 142.4.119.230 on Port 445(SMB)
2019-09-20 06:07:56
196.200.181.2 attackbotsspam
Sep 19 22:17:38 OPSO sshd\[9911\]: Invalid user egmont from 196.200.181.2 port 37252
Sep 19 22:17:38 OPSO sshd\[9911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.200.181.2
Sep 19 22:17:40 OPSO sshd\[9911\]: Failed password for invalid user egmont from 196.200.181.2 port 37252 ssh2
Sep 19 22:21:47 OPSO sshd\[10810\]: Invalid user amandabackup from 196.200.181.2 port 58073
Sep 19 22:21:47 OPSO sshd\[10810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.200.181.2
2019-09-20 05:51:35

Recently Reported IPs

104.21.2.6 104.21.2.52 104.21.2.50 104.21.2.60
104.21.2.71 104.21.2.74 104.21.68.130 104.21.2.72
104.21.2.65 104.21.2.88 104.21.2.78 104.21.2.87
104.21.2.86 104.21.2.63 104.21.2.77 104.21.2.92
104.21.20.10 104.21.2.98 104.21.2.93 104.21.20.100