Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.33.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19562
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.33.125.			IN	A

;; AUTHORITY SECTION:
.			408	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:24:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 125.33.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.33.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.6.163.174 attack
Jul 12 19:43:53 XXXXXX sshd[33391]: Invalid user umesh from 177.6.163.174 port 59656
2019-07-13 11:34:32
145.239.91.91 attackbots
2019-07-12T22:18:13.855473stark.klein-stark.info sshd\[26761\]: Invalid user bj from 145.239.91.91 port 48801
2019-07-12T22:18:13.861322stark.klein-stark.info sshd\[26761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.ip-145-239-91.eu
2019-07-12T22:18:15.389262stark.klein-stark.info sshd\[26761\]: Failed password for invalid user bj from 145.239.91.91 port 48801 ssh2
...
2019-07-13 11:28:09
111.56.44.252 attack
Jul 13 05:52:13 dev sshd\[7929\]: Invalid user appuser from 111.56.44.252 port 55228
Jul 13 05:52:13 dev sshd\[7929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.56.44.252
...
2019-07-13 11:53:27
159.65.149.131 attack
Jul 13 02:50:38 *** sshd[3692]: Invalid user chicago from 159.65.149.131
2019-07-13 11:30:44
185.176.27.26 attackspam
12.07.2019 22:31:33 Connection to port 19400 blocked by firewall
2019-07-13 11:48:37
139.99.123.74 attackspam
blogonese.net 139.99.123.74 \[13/Jul/2019:02:16:53 +0200\] "POST /wp-login.php HTTP/1.1" 200 5771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 139.99.123.74 \[13/Jul/2019:02:16:55 +0200\] "POST /wp-login.php HTTP/1.1" 200 5731 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 139.99.123.74 \[13/Jul/2019:02:16:56 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4086 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-13 11:19:27
104.236.186.24 attackbots
Invalid user alice from 104.236.186.24
2019-07-13 11:47:35
189.86.186.122 attack
Unauthorized connection attempt from IP address 189.86.186.122 on Port 445(SMB)
2019-07-13 11:41:35
114.25.114.10 attackspambots
firewall-block, port(s): 23/tcp
2019-07-13 11:37:44
112.104.1.211 attack
port scan and connect, tcp 23 (telnet)
2019-07-13 11:24:28
222.186.174.123 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-07-13 11:29:33
117.3.66.106 attackspambots
Unauthorized connection attempt from IP address 117.3.66.106 on Port 445(SMB)
2019-07-13 11:18:38
103.6.198.47 attack
xmlrpc attack
2019-07-13 11:51:34
59.125.247.227 attackbotsspam
Jul 12 22:33:37 mail sshd\[14425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.247.227  user=www-data
Jul 12 22:33:39 mail sshd\[14425\]: Failed password for www-data from 59.125.247.227 port 58099 ssh2
Jul 12 22:39:45 mail sshd\[14571\]: Invalid user admin from 59.125.247.227 port 53362
Jul 12 22:39:45 mail sshd\[14571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.247.227
Jul 12 22:39:46 mail sshd\[14571\]: Failed password for invalid user admin from 59.125.247.227 port 53362 ssh2
...
2019-07-13 11:36:39
125.64.94.221 attack
13.07.2019 02:17:08 Connection to port 32783 blocked by firewall
2019-07-13 11:34:50

Recently Reported IPs

104.21.33.111 104.21.69.148 104.21.33.121 104.21.33.126
15.130.143.59 104.21.33.122 104.21.33.13 104.21.33.133
104.21.33.135 104.21.33.138 104.21.33.144 104.21.33.132
104.21.33.139 104.21.33.137 104.21.33.147 104.21.33.151
104.21.69.149 104.21.33.150 104.21.33.152 104.21.33.156