Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.50.167
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.50.167.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 23:31:35 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 167.50.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 167.50.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.6.240.159 attack
Feb  4 17:34:10 odroid64 sshd\[32020\]: Invalid user service from 201.6.240.159
Feb  4 17:34:10 odroid64 sshd\[32020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.240.159
Feb  4 17:34:12 odroid64 sshd\[32020\]: Failed password for invalid user service from 201.6.240.159 port 43415 ssh2
May 25 01:36:04 odroid64 sshd\[9099\]: Invalid user test from 201.6.240.159
May 25 01:36:04 odroid64 sshd\[9099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.240.159
May 25 01:36:06 odroid64 sshd\[9099\]: Failed password for invalid user test from 201.6.240.159 port 9224 ssh2
...
2019-10-18 04:16:37
123.206.18.14 attack
Invalid user chat2b from 123.206.18.14 port 37080
2019-10-18 03:40:47
201.72.58.130 attack
Apr 30 05:59:40 odroid64 sshd\[30326\]: User root from 201.72.58.130 not allowed because not listed in AllowUsers
Apr 30 05:59:40 odroid64 sshd\[30326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.72.58.130  user=root
Apr 30 05:59:43 odroid64 sshd\[30326\]: Failed password for invalid user root from 201.72.58.130 port 22793 ssh2
...
2019-10-18 03:58:51
185.153.199.2 attackbots
Oct 17 20:18:19 h2177944 kernel: \[4212242.707915\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.199.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=8339 PROTO=TCP SPT=57762 DPT=3336 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 20:23:17 h2177944 kernel: \[4212540.901828\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.199.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=45308 PROTO=TCP SPT=57762 DPT=33334 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 20:37:12 h2177944 kernel: \[4213375.738845\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.199.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=8884 PROTO=TCP SPT=57762 DPT=61225 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 20:54:52 h2177944 kernel: \[4214435.661464\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.199.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=58376 PROTO=TCP SPT=57762 DPT=3342 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 21:02:40 h2177944 kernel: \[4214903.873141\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.199.2 DST=85.214.117.9
2019-10-18 03:44:12
54.39.98.253 attack
Oct 17 09:39:37 friendsofhawaii sshd\[16335\]: Invalid user worker123 from 54.39.98.253
Oct 17 09:39:37 friendsofhawaii sshd\[16335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=253.ip-54-39-98.net
Oct 17 09:39:39 friendsofhawaii sshd\[16335\]: Failed password for invalid user worker123 from 54.39.98.253 port 48810 ssh2
Oct 17 09:44:11 friendsofhawaii sshd\[16693\]: Invalid user qwe!@\#asd!@\#zxc from 54.39.98.253
Oct 17 09:44:11 friendsofhawaii sshd\[16693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=253.ip-54-39-98.net
2019-10-18 03:56:00
200.110.174.137 attackspambots
Feb 23 07:03:32 odroid64 sshd\[18070\]: Invalid user team from 200.110.174.137
Feb 23 07:03:32 odroid64 sshd\[18070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.174.137
Feb 23 07:03:34 odroid64 sshd\[18070\]: Failed password for invalid user team from 200.110.174.137 port 48876 ssh2
Mar 21 13:04:55 odroid64 sshd\[23205\]: Invalid user sharp from 200.110.174.137
Mar 21 13:04:55 odroid64 sshd\[23205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.174.137
Mar 21 13:04:57 odroid64 sshd\[23205\]: Failed password for invalid user sharp from 200.110.174.137 port 49896 ssh2
Apr 15 13:58:38 odroid64 sshd\[8642\]: Invalid user finger from 200.110.174.137
Apr 15 13:58:38 odroid64 sshd\[8642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.174.137
Apr 15 13:58:40 odroid64 sshd\[8642\]: Failed password for invalid user finger from 200.11
...
2019-10-18 03:55:02
118.25.150.90 attackbotsspam
Oct 14 18:21:02 euve59663 sshd[7756]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D118.=
25.150.90  user=3Duucp
Oct 14 18:21:04 euve59663 sshd[7756]: Failed password for uucp from 118=
.25.150.90 port 43493 ssh2
Oct 14 18:21:04 euve59663 sshd[7756]: Received disconnect from 118.25.1=
50.90: 11: Bye Bye [preauth]
Oct 14 18:33:25 euve59663 sshd[2649]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D118.=
25.150.90  user=3Dr.r
Oct 14 18:33:27 euve59663 sshd[2649]: Failed password for r.r from 118=
.25.150.90 port 55810 ssh2
Oct 14 18:33:28 euve59663 sshd[2649]: Received disconnect from 118.25.1=
50.90: 11: Bye Bye [preauth]
Oct 14 18:38:00 euve59663 sshd[2692]: Invalid user ftp_boot from 118.25=
.150.90
Oct 14 18:38:00 euve59663 sshd[2692]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D118.=
25.150.90=20
Oct ........
-------------------------------
2019-10-18 03:43:16
103.74.122.183 attackbotsspam
2019-10-17T13:58:22Z - RDP login failed multiple times. (103.74.122.183)
2019-10-18 03:47:49
170.254.205.200 attack
Autoban   170.254.205.200 AUTH/CONNECT
2019-10-18 04:13:52
134.73.76.184 attackspam
Postfix RBL failed
2019-10-18 03:42:10
103.247.13.222 attack
Oct 14 18:55:08 ghostname-secure sshd[29660]: reveeclipse mapping checking getaddrinfo for ip-222-13-247.terabhostname.net.id [103.247.13.222] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 18:55:08 ghostname-secure sshd[29660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.247.13.222  user=r.r
Oct 14 18:55:10 ghostname-secure sshd[29660]: Failed password for r.r from 103.247.13.222 port 39170 ssh2
Oct 14 18:55:10 ghostname-secure sshd[29660]: Received disconnect from 103.247.13.222: 11: Bye Bye [preauth]
Oct 14 19:07:16 ghostname-secure sshd[29881]: reveeclipse mapping checking getaddrinfo for ip-222-13-247.terabhostname.net.id [103.247.13.222] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 19:07:16 ghostname-secure sshd[29881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.247.13.222  user=r.r
Oct 14 19:07:18 ghostname-secure sshd[29881]: Failed password for r.r from 103.247.13.222 por........
-------------------------------
2019-10-18 03:47:20
201.71.181.160 attack
Jun 15 00:10:31 odroid64 sshd\[11413\]: Invalid user admin from 201.71.181.160
Jun 15 00:10:31 odroid64 sshd\[11413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.71.181.160
Jun 15 00:10:34 odroid64 sshd\[11413\]: Failed password for invalid user admin from 201.71.181.160 port 60946 ssh2
...
2019-10-18 04:02:11
183.6.105.243 attack
SSH Brute-Forcing (ownc)
2019-10-18 04:17:07
95.133.32.99 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/95.133.32.99/ 
 UA - 1H : (58)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : UA 
 NAME ASN : ASN6849 
 
 IP : 95.133.32.99 
 
 CIDR : 95.133.0.0/17 
 
 PREFIX COUNT : 1366 
 
 UNIQUE IP COUNT : 1315840 
 
 
 WYKRYTE ATAKI Z ASN6849 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 3 
 24H - 13 
 
 DateTime : 2019-10-17 13:35:01 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-18 03:39:40
154.92.23.5 attack
Oct 15 22:22:21 finn sshd[7394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.23.5  user=r.r
Oct 15 22:22:23 finn sshd[7394]: Failed password for r.r from 154.92.23.5 port 56314 ssh2
Oct 15 22:22:23 finn sshd[7394]: Received disconnect from 154.92.23.5 port 56314:11: Bye Bye [preauth]
Oct 15 22:22:23 finn sshd[7394]: Disconnected from 154.92.23.5 port 56314 [preauth]
Oct 15 22:35:14 finn sshd[9807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.23.5  user=r.r
Oct 15 22:35:16 finn sshd[9807]: Failed password for r.r from 154.92.23.5 port 58356 ssh2
Oct 15 22:35:16 finn sshd[9807]: Received disconnect from 154.92.23.5 port 58356:11: Bye Bye [preauth]
Oct 15 22:35:16 finn sshd[9807]: Disconnected from 154.92.23.5 port 58356 [preauth]
Oct 15 22:40:25 finn sshd[11297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.23.5  user=r.r
........
-------------------------------
2019-10-18 04:04:09

Recently Reported IPs

104.21.50.166 104.21.50.170 104.21.50.171 104.21.50.177
104.21.50.180 104.21.50.184 104.21.50.185 104.21.50.187
104.21.50.189 104.21.50.192 104.21.50.194 104.21.50.195
146.241.37.181 104.21.50.197 104.21.50.2 104.21.50.20
104.21.50.202 104.21.50.203 104.21.50.205 104.21.50.209