Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.234.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.234.149.			IN	A

;; AUTHORITY SECTION:
.			155	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 08:42:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 149.234.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.234.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.68.192.106 attackbotsspam
Aug 19 20:49:12 tux-35-217 sshd\[3785\]: Invalid user ggg from 51.68.192.106 port 60380
Aug 19 20:49:12 tux-35-217 sshd\[3785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.192.106
Aug 19 20:49:14 tux-35-217 sshd\[3785\]: Failed password for invalid user ggg from 51.68.192.106 port 60380 ssh2
Aug 19 20:53:21 tux-35-217 sshd\[3812\]: Invalid user ts from 51.68.192.106 port 38964
Aug 19 20:53:21 tux-35-217 sshd\[3812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.192.106
...
2019-08-20 07:44:06
139.199.112.85 attackspambots
Aug 19 21:30:21 SilenceServices sshd[7589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.112.85
Aug 19 21:30:23 SilenceServices sshd[7589]: Failed password for invalid user tiny from 139.199.112.85 port 56990 ssh2
Aug 19 21:33:07 SilenceServices sshd[9233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.112.85
2019-08-20 07:05:47
52.4.148.210 attackbotsspam
Aug 20 00:36:42 meumeu sshd[13671]: Failed password for invalid user ying from 52.4.148.210 port 49364 ssh2
Aug 20 00:40:57 meumeu sshd[14367]: Failed password for invalid user liang from 52.4.148.210 port 40958 ssh2
Aug 20 00:45:08 meumeu sshd[14878]: Failed password for invalid user marcin from 52.4.148.210 port 60696 ssh2
...
2019-08-20 06:58:50
222.186.52.89 attackspam
Aug 20 00:54:42 eventyay sshd[8272]: Failed password for root from 222.186.52.89 port 37954 ssh2
Aug 20 00:54:51 eventyay sshd[8276]: Failed password for root from 222.186.52.89 port 56168 ssh2
...
2019-08-20 07:02:05
62.173.149.254 attack
EventTime:Tue Aug 20 04:53:44 AEST 2019,EventName:Client denied: configuration,TargetDataNamespace:/,TargetDataContainer:srv/www/isag.melbourne/site/,TargetDataName:E_NULL,SourceIP:62.173.149.254,VendorOutcomeCode:E_NULL,InitiatorServiceName:47136
2019-08-20 07:04:15
43.227.66.153 attack
Fail2Ban Ban Triggered
2019-08-20 07:24:50
170.130.187.22 attackbotsspam
Automatic report - Port Scan Attack
2019-08-20 07:30:26
154.183.201.37 attackspam
Excessive failed login attempts on port 25
2019-08-20 07:40:27
177.18.123.216 attackspam
Automatic report - Port Scan Attack
2019-08-20 07:28:56
68.183.237.122 attackbots
Aug 19 13:21:59 hiderm sshd\[8100\]: Invalid user device123 from 68.183.237.122
Aug 19 13:21:59 hiderm sshd\[8100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.237.122
Aug 19 13:22:01 hiderm sshd\[8100\]: Failed password for invalid user device123 from 68.183.237.122 port 39188 ssh2
Aug 19 13:29:50 hiderm sshd\[8738\]: Invalid user ezequiel123 from 68.183.237.122
Aug 19 13:29:50 hiderm sshd\[8738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.237.122
2019-08-20 07:29:56
114.67.74.139 attack
Aug 19 19:57:24 MK-Soft-VM3 sshd\[9856\]: Invalid user willy from 114.67.74.139 port 59364
Aug 19 19:57:24 MK-Soft-VM3 sshd\[9856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.74.139
Aug 19 19:57:26 MK-Soft-VM3 sshd\[9856\]: Failed password for invalid user willy from 114.67.74.139 port 59364 ssh2
...
2019-08-20 07:41:27
138.219.228.96 attack
$f2bV_matches_ltvn
2019-08-20 07:39:10
122.195.196.45 attackbots
Unauthorised access (Aug 19) SRC=122.195.196.45 LEN=40 TTL=49 ID=22582 TCP DPT=8080 WINDOW=55575 SYN
2019-08-20 07:27:50
35.197.227.71 attack
Aug 20 00:33:40 [munged] sshd[9646]: Invalid user dev from 35.197.227.71 port 55164
Aug 20 00:33:40 [munged] sshd[9646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.197.227.71
2019-08-20 06:56:15
104.206.128.18 attackspam
Honeypot hit.
2019-08-20 07:11:56

Recently Reported IPs

104.21.234.148 47.242.69.87 104.21.234.150 104.21.234.151
104.21.234.16 13.76.1.218 104.21.234.17 104.21.234.198
135.182.117.182 104.21.234.199 104.21.234.200 104.21.234.201
104.21.234.202 104.21.234.203 104.21.234.238 104.21.234.239
104.21.234.38 104.21.234.39 165.99.240.75 104.21.234.4