Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.48.179
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.48.179.			IN	A

;; AUTHORITY SECTION:
.			566	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 23:05:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 179.48.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 179.48.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.216 attackspambots
Sep  2 23:29:25 eventyay sshd[12249]: Failed password for root from 222.186.175.216 port 5168 ssh2
Sep  2 23:29:37 eventyay sshd[12249]: Failed password for root from 222.186.175.216 port 5168 ssh2
Sep  2 23:29:37 eventyay sshd[12249]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 5168 ssh2 [preauth]
...
2020-09-03 05:30:24
114.67.168.0 attack
Attempted Brute Force (dovecot)
2020-09-03 05:29:26
31.170.123.253 attackbots
probing for:
/wp-content/plugins/wp-file-manager/lib/css/places.css
2020-09-03 05:27:09
142.4.22.236 attackspambots
142.4.22.236 - - [02/Sep/2020:19:23:33 +0100] "POST /wp-login.php HTTP/1.1" 200 1874 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.22.236 - - [02/Sep/2020:19:23:36 +0100] "POST /wp-login.php HTTP/1.1" 200 1921 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.22.236 - - [02/Sep/2020:19:23:38 +0100] "POST /wp-login.php HTTP/1.1" 200 1874 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-03 05:23:20
185.234.216.237 attackbotsspam
SSH break in attempt
...
2020-09-03 05:37:14
200.69.141.210 attackbotsspam
Sep  2 23:40:27 pkdns2 sshd\[46485\]: Failed password for root from 200.69.141.210 port 60010 ssh2Sep  2 23:43:39 pkdns2 sshd\[46586\]: Failed password for root from 200.69.141.210 port 6775 ssh2Sep  2 23:46:52 pkdns2 sshd\[46728\]: Invalid user ares from 200.69.141.210Sep  2 23:46:54 pkdns2 sshd\[46728\]: Failed password for invalid user ares from 200.69.141.210 port 18080 ssh2Sep  2 23:50:08 pkdns2 sshd\[46851\]: Invalid user noel from 200.69.141.210Sep  2 23:50:10 pkdns2 sshd\[46851\]: Failed password for invalid user noel from 200.69.141.210 port 29323 ssh2
...
2020-09-03 05:06:17
121.162.151.108 attackspambots
SSH Brute Force
2020-09-03 05:38:23
3.81.26.85 attackspambots
Sep 02 15:18:23 askasleikir sshd[8552]: Failed password for invalid user admin from 3.81.26.85 port 51794 ssh2
2020-09-03 05:34:42
217.182.174.132 attackbotsspam
WordPress wp-login brute force :: 217.182.174.132 0.072 BYPASS [02/Sep/2020:21:09:38  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2578 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-03 05:20:38
185.220.102.248 attackbots
Sep  2 23:17:42 localhost sshd\[10438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.248  user=root
Sep  2 23:17:44 localhost sshd\[10438\]: Failed password for root from 185.220.102.248 port 8042 ssh2
Sep  2 23:17:47 localhost sshd\[10438\]: Failed password for root from 185.220.102.248 port 8042 ssh2
Sep  2 23:17:50 localhost sshd\[10438\]: Failed password for root from 185.220.102.248 port 8042 ssh2
Sep  2 23:17:52 localhost sshd\[10438\]: Failed password for root from 185.220.102.248 port 8042 ssh2
...
2020-09-03 05:28:46
180.166.192.66 attackbotsspam
2020-09-02T12:24:16.2650991495-001 sshd[396]: Invalid user svn from 180.166.192.66 port 14463
2020-09-02T12:24:18.3293121495-001 sshd[396]: Failed password for invalid user svn from 180.166.192.66 port 14463 ssh2
2020-09-02T12:26:12.2107801495-001 sshd[498]: Invalid user zt from 180.166.192.66 port 42279
2020-09-02T12:26:12.2146331495-001 sshd[498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.192.66
2020-09-02T12:26:12.2107801495-001 sshd[498]: Invalid user zt from 180.166.192.66 port 42279
2020-09-02T12:26:14.2004921495-001 sshd[498]: Failed password for invalid user zt from 180.166.192.66 port 42279 ssh2
...
2020-09-03 05:38:00
195.138.80.148 attackbotsspam
trying to exploit wordpress
2020-09-03 05:12:28
210.178.94.227 attackspam
Sep  2 19:25:51 ns381471 sshd[11712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.178.94.227
Sep  2 19:25:53 ns381471 sshd[11712]: Failed password for invalid user prueba from 210.178.94.227 port 36774 ssh2
2020-09-03 05:06:31
103.131.71.110 attackbotsspam
(mod_security) mod_security (id:210730) triggered by 103.131.71.110 (VN/Vietnam/bot-103-131-71-110.coccoc.com): 5 in the last 3600 secs
2020-09-03 05:21:21
140.206.86.124 attackspambots
Unwanted checking 80 or 443 port
...
2020-09-03 05:40:24

Recently Reported IPs

104.21.48.172 104.21.48.18 104.21.48.187 104.21.48.188
104.21.48.189 104.21.48.193 171.94.241.212 104.21.48.194
104.21.48.195 104.21.48.199 104.21.48.20 104.21.48.200
104.21.48.203 104.21.48.209 118.59.159.219 104.21.48.21
46.22.181.4 104.21.48.210 104.21.48.213 104.21.48.215