Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.45.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.45.56.			IN	A

;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:31:33 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 56.45.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.45.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
35.190.214.113 attackspambots
Brute forcing RDP port 3389
2020-09-21 19:02:34
119.29.170.38 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-21 19:13:17
180.250.18.20 attackspambots
Port scan followed by SSH.
2020-09-21 18:34:59
212.18.22.236 attackbots
$f2bV_matches
2020-09-21 19:00:33
69.51.16.248 attack
(sshd) Failed SSH login from 69.51.16.248 (US/United States/-): 5 in the last 3600 secs
2020-09-21 18:38:53
218.86.31.67 attackbotsspam
Sep 21 00:39:03 ny01 sshd[24114]: Failed password for root from 218.86.31.67 port 51388 ssh2
Sep 21 00:41:16 ny01 sshd[24464]: Failed password for root from 218.86.31.67 port 47912 ssh2
Sep 21 00:43:20 ny01 sshd[24788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.86.31.67
2020-09-21 19:10:54
60.212.37.94 attackspambots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=3575  .  dstport=2323  .     (2294)
2020-09-21 18:51:01
45.143.221.96 attackspam
[2020-09-21 00:57:45] NOTICE[1239][C-00005ebf] chan_sip.c: Call from '' (45.143.221.96:5071) to extension '011972594771385' rejected because extension not found in context 'public'.
[2020-09-21 00:57:45] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-21T00:57:45.149-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972594771385",SessionID="0x7f4d484e59a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.221.96/5071",ACLName="no_extension_match"
[2020-09-21 01:07:10] NOTICE[1239][C-00005ecd] chan_sip.c: Call from '' (45.143.221.96:5070) to extension '9011972594771385' rejected because extension not found in context 'public'.
[2020-09-21 01:07:10] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-21T01:07:10.504-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011972594771385",SessionID="0x7f4d484e59a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/4
...
2020-09-21 18:55:43
95.103.33.98 attack
Sep 20 17:57:59 blackbee postfix/smtpd[4139]: NOQUEUE: reject: RCPT from bband-dyn98.95-103-33.t-com.sk[95.103.33.98]: 554 5.7.1 Service unavailable; Client host [95.103.33.98] blocked using cbl.abuseat.org; Blocked - see http://www.abuseat.org/lookup.cgi?ip=95.103.33.98; from= to= proto=ESMTP helo=
...
2020-09-21 18:46:59
142.4.211.222 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-21 19:05:39
222.186.173.238 attackbots
Sep 21 12:30:39 prod4 sshd\[8649\]: Failed password for root from 222.186.173.238 port 37070 ssh2
Sep 21 12:30:42 prod4 sshd\[8649\]: Failed password for root from 222.186.173.238 port 37070 ssh2
Sep 21 12:30:46 prod4 sshd\[8649\]: Failed password for root from 222.186.173.238 port 37070 ssh2
...
2020-09-21 18:38:13
188.166.240.30 attackspam
(sshd) Failed SSH login from 188.166.240.30 (SG/Singapore/-/Singapore (Pioneer)/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 21 00:52:04 atlas sshd[12070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.30  user=root
Sep 21 00:52:06 atlas sshd[12070]: Failed password for root from 188.166.240.30 port 36514 ssh2
Sep 21 01:03:35 atlas sshd[15032]: Invalid user postgres from 188.166.240.30 port 38122
Sep 21 01:03:37 atlas sshd[15032]: Failed password for invalid user postgres from 188.166.240.30 port 38122 ssh2
Sep 21 01:10:17 atlas sshd[16664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.30  user=root
2020-09-21 18:34:30
49.233.88.126 attack
Sep 21 02:43:34 mockhub sshd[359260]: Invalid user test1 from 49.233.88.126 port 49756
Sep 21 02:43:36 mockhub sshd[359260]: Failed password for invalid user test1 from 49.233.88.126 port 49756 ssh2
Sep 21 02:49:19 mockhub sshd[359468]: Invalid user cssserver from 49.233.88.126 port 55954
...
2020-09-21 19:07:51
185.234.218.84 attackspam
Sep 21 10:31:45 mail postfix/smtpd\[19140\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 21 11:03:05 mail postfix/smtpd\[20283\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 21 11:13:32 mail postfix/smtpd\[20041\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 21 11:23:56 mail postfix/smtpd\[20789\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-21 18:40:14
218.255.86.106 attackbotsspam
$f2bV_matches
2020-09-21 18:39:15

Recently Reported IPs

104.21.45.38 104.21.45.6 104.21.45.64 104.21.45.73
104.21.45.75 104.21.45.71 104.21.7.127 104.21.45.8
104.21.45.87 104.21.45.80 104.21.45.88 104.21.45.68
104.21.45.78 104.21.45.67 104.21.45.91 104.21.46.106
104.21.45.95 104.21.46.115 104.21.46.116 104.21.45.90