Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.42.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26465
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.42.160.			IN	A

;; AUTHORITY SECTION:
.			450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:31:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 160.42.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 160.42.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.78.246.107 attackbotsspam
2019-07-30T07:35:10.862768abusebot-3.cloudsearch.cf sshd\[22218\]: Invalid user katie from 52.78.246.107 port 57708
2019-07-30 16:09:28
221.156.116.51 attack
Jul 30 10:46:12 mout sshd[16802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.116.51
Jul 30 10:46:12 mout sshd[16802]: Invalid user vi from 221.156.116.51 port 48310
Jul 30 10:46:14 mout sshd[16802]: Failed password for invalid user vi from 221.156.116.51 port 48310 ssh2
2019-07-30 16:56:08
62.234.44.43 attackspambots
Jul 30 09:31:22 h2177944 sshd\[4360\]: Invalid user areknet from 62.234.44.43 port 44052
Jul 30 09:31:22 h2177944 sshd\[4360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.44.43
Jul 30 09:31:24 h2177944 sshd\[4360\]: Failed password for invalid user areknet from 62.234.44.43 port 44052 ssh2
Jul 30 09:34:03 h2177944 sshd\[4388\]: Invalid user sunu from 62.234.44.43 port 56068
Jul 30 09:34:03 h2177944 sshd\[4388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.44.43
...
2019-07-30 16:47:14
182.61.105.89 attackbotsspam
Jul 30 09:55:53 cvbmail sshd\[30646\]: Invalid user ssh2 from 182.61.105.89
Jul 30 09:55:53 cvbmail sshd\[30646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.89
Jul 30 09:55:55 cvbmail sshd\[30646\]: Failed password for invalid user ssh2 from 182.61.105.89 port 57644 ssh2
2019-07-30 16:21:21
27.49.232.7 attack
445/tcp 445/tcp 445/tcp...
[2019-05-29/07-29]13pkt,1pt.(tcp)
2019-07-30 16:20:15
209.235.67.48 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.48  user=root
Failed password for root from 209.235.67.48 port 56369 ssh2
Invalid user ops from 209.235.67.48 port 53952
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.48
Failed password for invalid user ops from 209.235.67.48 port 53952 ssh2
2019-07-30 16:45:43
152.136.206.28 attackspambots
Jul 30 10:50:17 srv-4 sshd\[14309\]: Invalid user minecraft from 152.136.206.28
Jul 30 10:50:17 srv-4 sshd\[14309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.206.28
Jul 30 10:50:19 srv-4 sshd\[14309\]: Failed password for invalid user minecraft from 152.136.206.28 port 52682 ssh2
...
2019-07-30 16:32:30
31.206.41.114 attack
Jul 30 07:25:48 ms-srv sshd[33700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.206.41.114
Jul 30 07:25:50 ms-srv sshd[33700]: Failed password for invalid user richie from 31.206.41.114 port 6881 ssh2
2019-07-30 16:11:50
68.107.41.67 attack
scan z
2019-07-30 16:52:32
168.63.67.52 attackspam
(sshd) Failed SSH login from 168.63.67.52 (-): 5 in the last 3600 secs
2019-07-30 16:47:43
45.82.153.7 attackspam
Multiport scan : 516 ports scanned 2001 2002 2003 2006 2007 2008 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2100 2101 2104 2106 2107 2108 2109 2110 2201 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2218 2219 2220 2301 2303 2304 2305 2306 2307 2308 2309 2310 3000 3002 3003 3004 3005 3006 3007 3008 3009 3010 3011 3012 3014 3015 3017 3018 3019 3020 3021 3022 3026 3027 3301 3303 3304 3305 3306 3307 3311 .....
2019-07-30 16:18:49
86.44.4.101 attackspam
23/tcp 23/tcp 23/tcp...
[2019-05-29/07-29]13pkt,1pt.(tcp)
2019-07-30 16:12:15
180.179.174.247 attackbots
Jul 30 04:20:47 pornomens sshd\[26771\]: Invalid user saul from 180.179.174.247 port 52252
Jul 30 04:20:47 pornomens sshd\[26771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.174.247
Jul 30 04:20:49 pornomens sshd\[26771\]: Failed password for invalid user saul from 180.179.174.247 port 52252 ssh2
...
2019-07-30 16:44:27
221.215.130.162 attack
Jul 30 08:13:40 v22018076622670303 sshd\[7256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.215.130.162  user=root
Jul 30 08:13:42 v22018076622670303 sshd\[7256\]: Failed password for root from 221.215.130.162 port 35173 ssh2
Jul 30 08:16:21 v22018076622670303 sshd\[7266\]: Invalid user dedy from 221.215.130.162 port 47359
...
2019-07-30 16:44:50
94.191.89.180 attack
Jul 30 05:45:09 vps647732 sshd[30478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.89.180
Jul 30 05:45:11 vps647732 sshd[30478]: Failed password for invalid user sites from 94.191.89.180 port 57285 ssh2
...
2019-07-30 16:56:27

Recently Reported IPs

120.85.94.174 120.85.93.137 120.85.92.3 120.85.94.175
120.85.97.38 120.85.98.153 120.85.97.134 120.85.93.85
120.85.98.242 120.85.99.56 120.85.94.64 120.86.147.71
120.86.236.203 120.86.236.36 104.21.42.162 120.86.236.153
120.86.146.221 120.86.239.117 120.86.239.218 120.86.237.235