Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.48.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.48.112.			IN	A

;; AUTHORITY SECTION:
.			145	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 23:02:36 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 112.48.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.48.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.1.214.207 attack
Dec 12 16:06:03 ny01 sshd[13460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.207
Dec 12 16:06:05 ny01 sshd[13460]: Failed password for invalid user asterisk from 177.1.214.207 port 35591 ssh2
Dec 12 16:12:59 ny01 sshd[14211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.207
2019-12-13 05:27:30
5.133.66.104 attackspambots
Autoban   5.133.66.104 AUTH/CONNECT
2019-12-13 05:27:10
5.133.66.154 attackspambots
Autoban   5.133.66.154 AUTH/CONNECT
2019-12-13 05:10:31
129.204.101.132 attackbotsspam
Invalid user ly from 129.204.101.132 port 54342
2019-12-13 05:16:26
5.10.66.243 attackspam
Autoban   5.10.66.243 AUTH/CONNECT
2019-12-13 05:31:59
82.213.196.108 attackspam
$f2bV_matches_ltvn
2019-12-13 05:20:04
202.137.142.28 attack
Disconnected \(auth failed, 1 attempts in 6 secs\):
2019-12-13 05:14:30
46.29.79.57 attackbots
Autoban   46.29.79.57 AUTH/CONNECT
2019-12-13 05:43:39
49.48.20.146 attackspam
Autoban   49.48.20.146 AUTH/CONNECT
2019-12-13 05:33:18
5.133.66.108 attack
Autoban   5.133.66.108 AUTH/CONNECT
2019-12-13 05:26:48
62.110.66.66 attack
SSH invalid-user multiple login attempts
2019-12-13 05:32:18
46.44.201.116 attack
Autoban   46.44.201.116 AUTH/CONNECT
2019-12-13 05:40:42
5.133.66.102 attackspambots
Autoban   5.133.66.102 AUTH/CONNECT
2019-12-13 05:29:09
202.143.111.156 attack
Dec 12 18:45:46 localhost sshd\[6007\]: Invalid user kirschbaum from 202.143.111.156 port 55462
Dec 12 18:45:46 localhost sshd\[6007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.143.111.156
Dec 12 18:45:48 localhost sshd\[6007\]: Failed password for invalid user kirschbaum from 202.143.111.156 port 55462 ssh2
2019-12-13 05:14:10
106.54.16.96 attackbotsspam
Dec 12 17:02:37 localhost sshd\[12725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.16.96  user=lp
Dec 12 17:02:39 localhost sshd\[12725\]: Failed password for lp from 106.54.16.96 port 54894 ssh2
Dec 12 17:19:36 localhost sshd\[12997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.16.96  user=backup
...
2019-12-13 05:16:41

Recently Reported IPs

105.93.55.146 104.21.48.113 104.21.48.118 104.21.48.12
43.202.205.208 104.21.48.122 104.21.48.123 104.21.48.129
104.21.48.131 104.21.48.132 104.21.48.135 242.207.220.58
104.21.48.137 104.21.48.140 104.21.48.141 104.21.48.142
104.21.48.143 104.21.48.144 104.21.48.146 104.21.48.153