Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.30.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.30.133.			IN	A

;; AUTHORITY SECTION:
.			150	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 20:25:13 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 133.30.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.30.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.175.188.204 attack
Apr 19 09:02:34 vps46666688 sshd[3619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.188.204
Apr 19 09:02:35 vps46666688 sshd[3619]: Failed password for invalid user admin1 from 134.175.188.204 port 37450 ssh2
...
2020-04-19 23:17:23
101.91.200.186 attack
Apr 19 15:43:09 Ubuntu-1404-trusty-64-minimal sshd\[22033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.200.186  user=root
Apr 19 15:43:11 Ubuntu-1404-trusty-64-minimal sshd\[22033\]: Failed password for root from 101.91.200.186 port 54658 ssh2
Apr 19 15:52:55 Ubuntu-1404-trusty-64-minimal sshd\[28332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.200.186  user=root
Apr 19 15:52:57 Ubuntu-1404-trusty-64-minimal sshd\[28332\]: Failed password for root from 101.91.200.186 port 52252 ssh2
Apr 19 15:54:26 Ubuntu-1404-trusty-64-minimal sshd\[29100\]: Invalid user admin from 101.91.200.186
2020-04-19 23:14:42
223.171.32.56 attack
Apr 19 15:39:16 ns382633 sshd\[13502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.56  user=root
Apr 19 15:39:18 ns382633 sshd\[13502\]: Failed password for root from 223.171.32.56 port 12745 ssh2
Apr 19 15:47:25 ns382633 sshd\[15104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.56  user=root
Apr 19 15:47:27 ns382633 sshd\[15104\]: Failed password for root from 223.171.32.56 port 12745 ssh2
Apr 19 15:53:27 ns382633 sshd\[16039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.56  user=root
2020-04-19 23:22:52
110.43.208.244 attackbotsspam
[MK-Root1] Blocked by UFW
2020-04-19 23:31:21
78.4.156.114 attackspam
Lines containing failures of 78.4.156.114
Apr 19 13:50:18 keyhelp sshd[5867]: Invalid user admin from 78.4.156.114 port 50273
Apr 19 13:50:18 keyhelp sshd[5867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.4.156.114
Apr 19 13:50:20 keyhelp sshd[5867]: Failed password for invalid user admin from 78.4.156.114 port 50273 ssh2
Apr 19 13:50:20 keyhelp sshd[5867]: Connection closed by invalid user admin 78.4.156.114 port 50273 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=78.4.156.114
2020-04-19 22:49:52
202.191.56.159 attackspam
(sshd) Failed SSH login from 202.191.56.159 (VN/Vietnam/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 19 16:34:04 amsweb01 sshd[29499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.191.56.159  user=root
Apr 19 16:34:06 amsweb01 sshd[29499]: Failed password for root from 202.191.56.159 port 60794 ssh2
Apr 19 16:44:52 amsweb01 sshd[31015]: Invalid user oracle from 202.191.56.159 port 51776
Apr 19 16:44:54 amsweb01 sshd[31015]: Failed password for invalid user oracle from 202.191.56.159 port 51776 ssh2
Apr 19 16:47:16 amsweb01 sshd[31476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.191.56.159  user=root
2020-04-19 23:28:32
51.38.238.165 attackspambots
Apr 19 14:02:57 vmd48417 sshd[17319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.165
2020-04-19 22:57:26
175.182.20.225 attackbots
1587297778 - 04/19/2020 14:02:58 Host: 175.182.20.225/175.182.20.225 Port: 445 TCP Blocked
2020-04-19 22:55:58
69.229.6.52 attack
Apr 19 14:02:49 ncomp sshd[13128]: Invalid user admin from 69.229.6.52
Apr 19 14:02:49 ncomp sshd[13128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.52
Apr 19 14:02:49 ncomp sshd[13128]: Invalid user admin from 69.229.6.52
Apr 19 14:02:51 ncomp sshd[13128]: Failed password for invalid user admin from 69.229.6.52 port 45112 ssh2
2020-04-19 23:04:05
139.162.83.10 attackspam
Unauthorized connection attempt detected from IP address 139.162.83.10 to port 8998
2020-04-19 22:58:06
159.203.36.154 attackbotsspam
"fail2ban match"
2020-04-19 23:16:42
165.22.182.139 attackbots
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-19 23:25:42
203.148.20.254 attackspam
Apr 19 14:57:31 Enigma sshd[29151]: Failed password for root from 203.148.20.254 port 45035 ssh2
Apr 19 15:02:28 Enigma sshd[29659]: Invalid user test from 203.148.20.254 port 46101
Apr 19 15:02:28 Enigma sshd[29659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.148.20.254
Apr 19 15:02:28 Enigma sshd[29659]: Invalid user test from 203.148.20.254 port 46101
Apr 19 15:02:29 Enigma sshd[29659]: Failed password for invalid user test from 203.148.20.254 port 46101 ssh2
2020-04-19 23:21:57
37.123.163.106 attackbots
Apr 19 16:02:55 lukav-desktop sshd\[3128\]: Invalid user sw from 37.123.163.106
Apr 19 16:02:55 lukav-desktop sshd\[3128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.123.163.106
Apr 19 16:02:57 lukav-desktop sshd\[3128\]: Failed password for invalid user sw from 37.123.163.106 port 13645 ssh2
Apr 19 16:07:29 lukav-desktop sshd\[10892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.123.163.106  user=root
Apr 19 16:07:32 lukav-desktop sshd\[10892\]: Failed password for root from 37.123.163.106 port 13645 ssh2
2020-04-19 23:18:17
153.214.139.49 attackbotsspam
Lines containing failures of 153.214.139.49
Apr 19 07:44:29 newdogma sshd[14544]: Invalid user postgres from 153.214.139.49 port 62730
Apr 19 07:44:29 newdogma sshd[14544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.214.139.49 
Apr 19 07:44:31 newdogma sshd[14544]: Failed password for invalid user postgres from 153.214.139.49 port 62730 ssh2
Apr 19 07:44:32 newdogma sshd[14544]: Received disconnect from 153.214.139.49 port 62730:11: Bye Bye [preauth]
Apr 19 07:44:32 newdogma sshd[14544]: Disconnected from invalid user postgres 153.214.139.49 port 62730 [preauth]
Apr 19 07:51:34 newdogma sshd[14641]: Invalid user ci from 153.214.139.49 port 60240
Apr 19 07:51:34 newdogma sshd[14641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.214.139.49 
Apr 19 07:51:37 newdogma sshd[14641]: Failed password for invalid user ci from 153.214.139.49 port 60240 ssh2


........
-----------------------------------------------
https://ww
2020-04-19 22:57:51

Recently Reported IPs

104.21.30.130 104.21.30.135 104.21.30.145 104.21.30.147
104.21.30.151 104.21.30.152 44.183.174.131 104.21.30.153
104.21.30.155 104.21.30.16 104.21.30.160 104.21.30.162
104.21.30.164 104.21.30.166 104.21.30.167 104.21.30.169
104.21.30.17 104.21.30.171 45.13.90.102 104.21.30.175