Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.23.233 spam
https://www.projecthoneypot.org/ip_104.21.23.233
https://multirbl.valli.org/lookup/104.21.23.233.html
https://cleantalk.org/blacklists/104.21.23.233#anc140146
2022-12-29 00:19:00
104.21.23.233 spam
https://www.projecthoneypot.org/ip_104.21.23.233
https://multirbl.valli.org/lookup/104.21.23.233.html
https://cleantalk.org/blacklists/104.21.23.233#anc140146
2022-12-29 00:13:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.2.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.2.53.			IN	A

;; AUTHORITY SECTION:
.			237	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 18:43:23 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 53.2.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.2.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.89.151.214 attack
$f2bV_matches
2019-08-22 23:03:16
61.161.151.204 attackbotsspam
Unauthorised access (Aug 22) SRC=61.161.151.204 LEN=40 TTL=48 ID=17483 TCP DPT=8080 WINDOW=20521 SYN 
Unauthorised access (Aug 22) SRC=61.161.151.204 LEN=40 TTL=48 ID=15607 TCP DPT=8080 WINDOW=26641 SYN
2019-08-22 23:02:33
192.99.167.136 attackspambots
Aug 22 05:47:01 aat-srv002 sshd[10351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.167.136
Aug 22 05:47:03 aat-srv002 sshd[10351]: Failed password for invalid user xbmc from 192.99.167.136 port 43514 ssh2
Aug 22 05:51:00 aat-srv002 sshd[10509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.167.136
Aug 22 05:51:03 aat-srv002 sshd[10509]: Failed password for invalid user litwina from 192.99.167.136 port 60714 ssh2
...
2019-08-22 22:24:33
125.46.78.210 attack
2019-08-22T14:55:18.242650abusebot-7.cloudsearch.cf sshd\[9823\]: Invalid user cron from 125.46.78.210 port 50058
2019-08-22 22:56:22
166.62.92.48 attack
C1,WP GET /wp-login.php
2019-08-22 22:21:59
119.178.175.204 attack
$f2bV_matches
2019-08-22 21:31:34
178.128.99.27 attack
Aug 22 15:52:43 eventyay sshd[29375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.99.27
Aug 22 15:52:45 eventyay sshd[29375]: Failed password for invalid user police from 178.128.99.27 port 33664 ssh2
Aug 22 15:57:33 eventyay sshd[30648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.99.27
...
2019-08-22 22:02:28
27.111.36.136 attackspam
Aug 22 13:28:53 debian sshd\[3308\]: Invalid user suzy from 27.111.36.136 port 29106
Aug 22 13:28:53 debian sshd\[3308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.111.36.136
...
2019-08-22 22:09:06
51.68.123.198 attackspambots
Aug 22 03:24:50 php1 sshd\[2062\]: Invalid user hadoop from 51.68.123.198
Aug 22 03:24:50 php1 sshd\[2062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.198
Aug 22 03:24:53 php1 sshd\[2062\]: Failed password for invalid user hadoop from 51.68.123.198 port 35024 ssh2
Aug 22 03:28:48 php1 sshd\[2466\]: Invalid user business from 51.68.123.198
Aug 22 03:28:48 php1 sshd\[2466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.198
2019-08-22 21:39:49
90.176.60.203 attackspambots
Invalid user oracle from 90.176.60.203 port 26494
2019-08-22 22:06:22
222.186.42.94 attack
Aug 22 10:04:42 debian sshd[6876]: Unable to negotiate with 222.186.42.94 port 26152: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Aug 22 10:08:03 debian sshd[7006]: Unable to negotiate with 222.186.42.94 port 62590: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
...
2019-08-22 22:10:25
51.75.122.16 attackbots
2019-08-22T09:42:52.195809mizuno.rwx.ovh sshd[3635]: Connection from 51.75.122.16 port 49782 on 78.46.61.178 port 22
2019-08-22T09:42:52.375263mizuno.rwx.ovh sshd[3635]: Invalid user 8 from 51.75.122.16 port 49782
2019-08-22T09:42:52.380410mizuno.rwx.ovh sshd[3635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.122.16
2019-08-22T09:42:52.195809mizuno.rwx.ovh sshd[3635]: Connection from 51.75.122.16 port 49782 on 78.46.61.178 port 22
2019-08-22T09:42:52.375263mizuno.rwx.ovh sshd[3635]: Invalid user 8 from 51.75.122.16 port 49782
2019-08-22T09:42:54.314704mizuno.rwx.ovh sshd[3635]: Failed password for invalid user 8 from 51.75.122.16 port 49782 ssh2
...
2019-08-22 22:08:22
92.118.37.74 attack
Aug 22 15:21:00 h2177944 kernel: \[4803667.166847\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=61736 PROTO=TCP SPT=46525 DPT=25704 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 22 15:21:05 h2177944 kernel: \[4803672.991566\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=64292 PROTO=TCP SPT=46525 DPT=15752 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 22 15:21:13 h2177944 kernel: \[4803680.233984\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=42012 PROTO=TCP SPT=46525 DPT=35312 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 22 15:21:24 h2177944 kernel: \[4803691.585332\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=59395 PROTO=TCP SPT=46525 DPT=30317 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 22 15:23:05 h2177944 kernel: \[4803792.402170\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9
2019-08-22 22:05:42
168.255.251.126 attackbotsspam
Aug 22 14:08:54 MK-Soft-VM6 sshd\[14414\]: Invalid user amit from 168.255.251.126 port 53454
Aug 22 14:08:54 MK-Soft-VM6 sshd\[14414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.255.251.126
Aug 22 14:08:57 MK-Soft-VM6 sshd\[14414\]: Failed password for invalid user amit from 168.255.251.126 port 53454 ssh2
...
2019-08-22 23:10:34
189.224.165.158 attack
Aug 22 02:36:38 hanapaa sshd\[2824\]: Invalid user user002 from 189.224.165.158
Aug 22 02:36:38 hanapaa sshd\[2824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.224.165.158
Aug 22 02:36:41 hanapaa sshd\[2824\]: Failed password for invalid user user002 from 189.224.165.158 port 25450 ssh2
Aug 22 02:41:08 hanapaa sshd\[3372\]: Invalid user develop from 189.224.165.158
Aug 22 02:41:08 hanapaa sshd\[3372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.224.165.158
2019-08-22 21:27:57

Recently Reported IPs

104.21.2.5 104.21.2.54 167.67.241.104 104.21.2.55
104.21.2.56 104.21.2.57 200.46.118.93 69.54.97.222
104.21.2.58 104.21.2.62 163.126.177.89 104.21.2.66
87.90.52.161 104.21.2.68 104.21.2.69 46.132.117.116
104.21.2.70 104.21.2.73 104.21.2.79 104.21.2.8