Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.43.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.43.194.			IN	A

;; AUTHORITY SECTION:
.			113	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 10:26:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 194.43.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.43.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.227.53.225 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-02T11:28:54Z and 2020-10-02T11:37:35Z
2020-10-02 22:46:01
63.168.21.198 attack
Icarus honeypot on github
2020-10-02 22:48:32
165.227.46.89 attackspambots
Oct  2 17:14:41 nextcloud sshd\[7873\]: Invalid user readonly from 165.227.46.89
Oct  2 17:14:41 nextcloud sshd\[7873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.46.89
Oct  2 17:14:44 nextcloud sshd\[7873\]: Failed password for invalid user readonly from 165.227.46.89 port 59454 ssh2
2020-10-02 23:22:56
106.52.137.134 attack
2020-10-02T07:52:59.465420abusebot-2.cloudsearch.cf sshd[25966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.137.134  user=root
2020-10-02T07:53:01.564069abusebot-2.cloudsearch.cf sshd[25966]: Failed password for root from 106.52.137.134 port 49896 ssh2
2020-10-02T07:57:17.848240abusebot-2.cloudsearch.cf sshd[26021]: Invalid user user3 from 106.52.137.134 port 37276
2020-10-02T07:57:17.854014abusebot-2.cloudsearch.cf sshd[26021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.137.134
2020-10-02T07:57:17.848240abusebot-2.cloudsearch.cf sshd[26021]: Invalid user user3 from 106.52.137.134 port 37276
2020-10-02T07:57:20.037882abusebot-2.cloudsearch.cf sshd[26021]: Failed password for invalid user user3 from 106.52.137.134 port 37276 ssh2
2020-10-02T08:01:29.046442abusebot-2.cloudsearch.cf sshd[26037]: Invalid user oracle from 106.52.137.134 port 52886
...
2020-10-02 23:02:27
142.93.193.63 attack
142.93.193.63 - - [02/Oct/2020:09:22:58 +0100] "POST /wp-login.php HTTP/1.1" 200 2598 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.193.63 - - [02/Oct/2020:09:23:00 +0100] "POST /wp-login.php HTTP/1.1" 200 2540 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.193.63 - - [02/Oct/2020:09:23:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2583 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-02 22:47:40
62.112.11.8 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-10-02T12:34:35Z and 2020-10-02T14:31:25Z
2020-10-02 23:10:42
188.166.219.183 attack
Port probing on unauthorized port 2375
2020-10-02 23:02:54
128.199.120.132 attackbotsspam
Oct  2 11:48:03 rotator sshd\[16839\]: Invalid user project from 128.199.120.132Oct  2 11:48:05 rotator sshd\[16839\]: Failed password for invalid user project from 128.199.120.132 port 59398 ssh2Oct  2 11:52:40 rotator sshd\[17636\]: Invalid user alicia from 128.199.120.132Oct  2 11:52:42 rotator sshd\[17636\]: Failed password for invalid user alicia from 128.199.120.132 port 44172 ssh2Oct  2 11:56:43 rotator sshd\[18457\]: Invalid user test from 128.199.120.132Oct  2 11:56:45 rotator sshd\[18457\]: Failed password for invalid user test from 128.199.120.132 port 52848 ssh2
...
2020-10-02 23:15:14
180.76.135.15 attackbots
Oct 2 16:42:17 *hidden* sshd[7338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.15 Oct 2 16:42:19 *hidden* sshd[7338]: Failed password for invalid user docker from 180.76.135.15 port 44916 ssh2 Oct 2 16:57:14 *hidden* sshd[39096]: Invalid user ubuntu from 180.76.135.15 port 54836
2020-10-02 23:22:00
114.245.31.241 attackbots
Invalid user openhabian from 114.245.31.241 port 58212
2020-10-02 23:21:03
45.55.182.232 attack
Invalid user odoo from 45.55.182.232 port 46198
2020-10-02 22:53:49
146.56.192.60 attack
Oct  2 13:44:51 onepixel sshd[23702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.56.192.60 
Oct  2 13:44:51 onepixel sshd[23702]: Invalid user user from 146.56.192.60 port 42346
Oct  2 13:44:53 onepixel sshd[23702]: Failed password for invalid user user from 146.56.192.60 port 42346 ssh2
Oct  2 13:49:13 onepixel sshd[24365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.56.192.60  user=root
Oct  2 13:49:15 onepixel sshd[24365]: Failed password for root from 146.56.192.60 port 60304 ssh2
2020-10-02 22:58:17
174.138.52.50 attackspambots
Invalid user myuser1 from 174.138.52.50 port 57794
2020-10-02 23:19:57
139.59.32.156 attack
Oct  2 05:18:51 master sshd[28541]: Failed password for root from 139.59.32.156 port 45730 ssh2
Oct  2 05:31:04 master sshd[29102]: Failed password for root from 139.59.32.156 port 42340 ssh2
Oct  2 05:36:21 master sshd[29141]: Failed password for invalid user franco from 139.59.32.156 port 49206 ssh2
Oct  2 05:41:17 master sshd[29259]: Failed password for invalid user testing from 139.59.32.156 port 56084 ssh2
Oct  2 05:45:49 master sshd[29302]: Failed password for invalid user redis2 from 139.59.32.156 port 34726 ssh2
Oct  2 05:50:16 master sshd[29380]: Failed password for invalid user carlos from 139.59.32.156 port 41604 ssh2
Oct  2 05:54:41 master sshd[29394]: Failed password for invalid user admin from 139.59.32.156 port 48482 ssh2
Oct  2 05:59:08 master sshd[29441]: Failed password for invalid user henry from 139.59.32.156 port 55356 ssh2
Oct  2 06:03:27 master sshd[29892]: Failed password for invalid user system from 139.59.32.156 port 33998 ssh2
2020-10-02 23:12:13
153.149.154.73 attack
Repeated RDP login failures. Last user: Server
2020-10-02 22:56:21

Recently Reported IPs

104.21.43.193 121.118.144.196 104.21.43.196 104.21.43.20
104.21.43.219 104.21.43.235 104.21.43.24 104.21.43.35
104.21.43.41 104.21.43.57 104.21.43.62 104.21.43.73
104.21.43.88 104.21.44.137 104.21.44.16 104.21.44.168
104.21.44.185 112.206.100.53 104.21.44.199 104.21.44.202