Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.35.202 spam
AKA healthpreneurgroup.com email spammers
2023-06-28 05:07:37
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.3.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20852
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.3.22.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:29:41 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 22.3.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.3.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
75.44.16.251 attack
(sshd) Failed SSH login from 75.44.16.251 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 13 20:07:37 grace sshd[26085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.44.16.251  user=root
Sep 13 20:07:39 grace sshd[26085]: Failed password for root from 75.44.16.251 port 45992 ssh2
Sep 13 20:23:45 grace sshd[27771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.44.16.251  user=root
Sep 13 20:23:47 grace sshd[27771]: Failed password for root from 75.44.16.251 port 43326 ssh2
Sep 13 20:31:11 grace sshd[29201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.44.16.251  user=root
2020-09-14 03:57:57
51.79.86.173 attackspambots
SSH auth scanning - multiple failed logins
2020-09-14 03:27:17
47.56.234.187 attackspam
Unauthorised use of XMLRPC
2020-09-14 03:55:26
219.249.243.191 attackbotsspam
2020-09-13T05:31:45.229070ns386461 sshd\[32378\]: Invalid user pi from 219.249.243.191 port 45582
2020-09-13T05:31:45.448894ns386461 sshd\[32380\]: Invalid user pi from 219.249.243.191 port 45586
2020-09-13T05:31:45.490167ns386461 sshd\[32378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.249.243.191
2020-09-13T05:31:45.711842ns386461 sshd\[32380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.249.243.191
2020-09-13T05:31:47.730471ns386461 sshd\[32378\]: Failed password for invalid user pi from 219.249.243.191 port 45582 ssh2
...
2020-09-14 03:51:40
186.154.39.240 attackspambots
Icarus honeypot on github
2020-09-14 03:54:04
103.219.112.31 attackbots
 TCP (SYN) 103.219.112.31:49186 -> port 12698, len 44
2020-09-14 03:49:45
192.99.175.182 attackspam
 TCP (SYN) 192.99.175.182:36374 -> port 23, len 60
2020-09-14 03:48:13
205.185.117.149 attackbotsspam
2020-09-13T19:44:17.201566abusebot-5.cloudsearch.cf sshd[7332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit.greektor.net  user=root
2020-09-13T19:44:19.493695abusebot-5.cloudsearch.cf sshd[7332]: Failed password for root from 205.185.117.149 port 57414 ssh2
2020-09-13T19:44:21.725284abusebot-5.cloudsearch.cf sshd[7332]: Failed password for root from 205.185.117.149 port 57414 ssh2
2020-09-13T19:44:17.201566abusebot-5.cloudsearch.cf sshd[7332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit.greektor.net  user=root
2020-09-13T19:44:19.493695abusebot-5.cloudsearch.cf sshd[7332]: Failed password for root from 205.185.117.149 port 57414 ssh2
2020-09-13T19:44:21.725284abusebot-5.cloudsearch.cf sshd[7332]: Failed password for root from 205.185.117.149 port 57414 ssh2
2020-09-13T19:44:17.201566abusebot-5.cloudsearch.cf sshd[7332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu
...
2020-09-14 03:45:06
180.247.79.143 attack
Unauthorized connection attempt from IP address 180.247.79.143 on Port 445(SMB)
2020-09-14 03:40:28
165.22.121.56 attack
invalid login attempt (mcserver)
2020-09-14 03:36:36
151.253.125.137 attack
Sep 13 21:18:38 vps647732 sshd[26150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.253.125.137
Sep 13 21:18:40 vps647732 sshd[26150]: Failed password for invalid user packer from 151.253.125.137 port 44438 ssh2
...
2020-09-14 03:27:02
51.75.23.62 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-09-14 03:46:36
88.98.254.132 attackspam
Sep 13 10:54:36 NPSTNNYC01T sshd[23716]: Failed password for root from 88.98.254.132 port 36328 ssh2
Sep 13 10:56:32 NPSTNNYC01T sshd[23983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.98.254.132
Sep 13 10:56:34 NPSTNNYC01T sshd[23983]: Failed password for invalid user test from 88.98.254.132 port 38932 ssh2
...
2020-09-14 03:42:32
49.145.199.75 attackspambots
1599929304 - 09/12/2020 18:48:24 Host: 49.145.199.75/49.145.199.75 Port: 445 TCP Blocked
2020-09-14 03:57:02
93.46.167.60 attack
firewall-block, port(s): 445/tcp
2020-09-14 03:31:40

Recently Reported IPs

104.21.3.29 104.21.30.14 104.21.3.93 104.21.30.120
104.21.30.184 104.21.30.172 104.21.30.250 104.21.31.113
104.21.31.117 104.21.30.77 104.21.31.121 104.21.31.21
104.21.31.168 104.21.31.19 104.21.31.27 104.21.31.200
104.21.31.72 104.21.31.99 104.21.32.12 104.21.31.61