Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.45.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.45.194.			IN	A

;; AUTHORITY SECTION:
.			341	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 22:40:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 194.45.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.45.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
199.249.230.87 attackspam
Automatic report - XMLRPC Attack
2019-12-13 23:37:29
202.163.126.134 attackspam
2019-12-13T15:44:05.913422vps751288.ovh.net sshd\[19590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.126.134  user=root
2019-12-13T15:44:07.955946vps751288.ovh.net sshd\[19590\]: Failed password for root from 202.163.126.134 port 53028 ssh2
2019-12-13T15:52:58.529066vps751288.ovh.net sshd\[19671\]: Invalid user ftpuser from 202.163.126.134 port 55803
2019-12-13T15:52:58.540874vps751288.ovh.net sshd\[19671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.126.134
2019-12-13T15:53:01.089684vps751288.ovh.net sshd\[19671\]: Failed password for invalid user ftpuser from 202.163.126.134 port 55803 ssh2
2019-12-14 00:01:12
60.10.199.38 attackbots
Invalid user alanah from 60.10.199.38 port 47344
2019-12-13 23:29:03
223.220.159.78 attackbots
Dec 13 16:34:07 localhost sshd\[13803\]: Invalid user rogerson from 223.220.159.78
Dec 13 16:34:07 localhost sshd\[13803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78
Dec 13 16:34:10 localhost sshd\[13803\]: Failed password for invalid user rogerson from 223.220.159.78 port 38621 ssh2
Dec 13 16:42:40 localhost sshd\[14374\]: Invalid user serban from 223.220.159.78
Dec 13 16:42:40 localhost sshd\[14374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78
...
2019-12-13 23:43:51
182.61.184.155 attackbots
Dec 13 21:43:25 webhost01 sshd[3327]: Failed password for root from 182.61.184.155 port 58366 ssh2
...
2019-12-13 23:24:40
123.143.203.67 attackspam
Dec 13 05:48:08 sachi sshd\[27878\]: Invalid user tomas from 123.143.203.67
Dec 13 05:48:08 sachi sshd\[27878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.143.203.67
Dec 13 05:48:10 sachi sshd\[27878\]: Failed password for invalid user tomas from 123.143.203.67 port 40054 ssh2
Dec 13 05:54:26 sachi sshd\[28433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.143.203.67  user=root
Dec 13 05:54:28 sachi sshd\[28433\]: Failed password for root from 123.143.203.67 port 48724 ssh2
2019-12-14 00:00:17
157.245.76.36 attack
Automatic report - Port Scan
2019-12-13 23:26:09
83.224.167.190 attack
Port 22 Scan, PTR: None
2019-12-14 00:00:45
112.225.71.19 attackbotsspam
Scanning
2019-12-13 23:54:16
43.239.176.113 attackspambots
Dec 13 15:23:11 MK-Soft-Root2 sshd[4031]: Failed password for root from 43.239.176.113 port 33033 ssh2
Dec 13 15:29:01 MK-Soft-Root2 sshd[5073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.239.176.113 
...
2019-12-13 23:30:32
88.154.55.207 attackspam
1576222900 - 12/13/2019 08:41:40 Host: 88.154.55.207/88.154.55.207 Port: 445 TCP Blocked
2019-12-13 23:35:53
45.82.153.82 attackbotsspam
Dec 13 16:42:06 relay postfix/smtpd\[29161\]: warning: unknown\[45.82.153.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 16:46:15 relay postfix/smtpd\[26715\]: warning: unknown\[45.82.153.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 16:46:34 relay postfix/smtpd\[26715\]: warning: unknown\[45.82.153.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 16:46:56 relay postfix/smtpd\[2583\]: warning: unknown\[45.82.153.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 16:50:59 relay postfix/smtpd\[29161\]: warning: unknown\[45.82.153.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-13 23:59:37
222.186.173.238 attackspambots
Dec 13 16:19:28 ArkNodeAT sshd\[10169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Dec 13 16:19:29 ArkNodeAT sshd\[10169\]: Failed password for root from 222.186.173.238 port 40318 ssh2
Dec 13 16:19:45 ArkNodeAT sshd\[10173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
2019-12-13 23:20:53
148.70.33.136 attack
Dec 13 07:28:18 home sshd[12395]: Invalid user ervice from 148.70.33.136 port 54130
Dec 13 07:28:18 home sshd[12395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.33.136
Dec 13 07:28:18 home sshd[12395]: Invalid user ervice from 148.70.33.136 port 54130
Dec 13 07:28:20 home sshd[12395]: Failed password for invalid user ervice from 148.70.33.136 port 54130 ssh2
Dec 13 07:37:09 home sshd[12436]: Invalid user tabler from 148.70.33.136 port 36786
Dec 13 07:37:09 home sshd[12436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.33.136
Dec 13 07:37:09 home sshd[12436]: Invalid user tabler from 148.70.33.136 port 36786
Dec 13 07:37:12 home sshd[12436]: Failed password for invalid user tabler from 148.70.33.136 port 36786 ssh2
Dec 13 07:45:34 home sshd[12466]: Invalid user clarke from 148.70.33.136 port 43700
Dec 13 07:45:34 home sshd[12466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser
2019-12-13 23:44:17
125.124.91.206 attackspam
2019-12-13T11:42:29.298538abusebot.cloudsearch.cf sshd\[1695\]: Invalid user Aulis from 125.124.91.206 port 45750
2019-12-13T11:42:29.303451abusebot.cloudsearch.cf sshd\[1695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.91.206
2019-12-13T11:42:31.512851abusebot.cloudsearch.cf sshd\[1695\]: Failed password for invalid user Aulis from 125.124.91.206 port 45750 ssh2
2019-12-13T11:49:10.244729abusebot.cloudsearch.cf sshd\[1783\]: Invalid user hoppenworth from 125.124.91.206 port 40700
2019-12-13 23:52:14

Recently Reported IPs

104.21.45.193 104.21.45.197 104.21.45.204 104.21.45.205
104.21.45.208 104.21.45.210 104.21.45.211 104.21.45.212
104.21.45.217 104.21.45.219 96.185.238.183 104.21.45.22
104.21.45.220 104.21.45.223 104.21.45.224 104.21.45.229
223.221.232.33 104.21.45.235 104.21.45.239 104.21.45.240