Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.53.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5667
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.53.116.			IN	A

;; AUTHORITY SECTION:
.			524	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:36:05 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 116.53.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 116.53.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.122.202.200 attackspambots
Sep 25 16:32:40 ny01 sshd[5513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.122.202.200
Sep 25 16:32:42 ny01 sshd[5513]: Failed password for invalid user gg from 138.122.202.200 port 59392 ssh2
Sep 25 16:37:03 ny01 sshd[6193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.122.202.200
2019-09-26 04:47:26
195.9.32.22 attack
2019-09-25T13:05:50.9074611495-001 sshd\[5590\]: Failed password for invalid user gr from 195.9.32.22 port 37271 ssh2
2019-09-25T13:20:57.8163651495-001 sshd\[6468\]: Invalid user ftpuser from 195.9.32.22 port 41757
2019-09-25T13:20:57.8257931495-001 sshd\[6468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.32.22
2019-09-25T13:21:00.3070681495-001 sshd\[6468\]: Failed password for invalid user ftpuser from 195.9.32.22 port 41757 ssh2
2019-09-25T13:25:59.9813541495-001 sshd\[6763\]: Invalid user rutorrent from 195.9.32.22 port 33844
2019-09-25T13:25:59.9915571495-001 sshd\[6763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.32.22
...
2019-09-26 04:35:12
41.66.235.146 attackbotsspam
Chat Spam
2019-09-26 04:27:38
92.63.194.26 attackspam
Sep 25 22:13:42 cvbnet sshd[23216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26 
Sep 25 22:13:44 cvbnet sshd[23216]: Failed password for invalid user admin from 92.63.194.26 port 52878 ssh2
2019-09-26 04:21:32
220.143.29.27 attackspambots
37215/tcp
[2019-09-25]1pkt
2019-09-26 04:19:15
88.84.200.139 attackbotsspam
Sep 25 20:13:33 vps691689 sshd[1462]: Failed password for root from 88.84.200.139 port 39857 ssh2
Sep 25 20:17:44 vps691689 sshd[1526]: Failed password for root from 88.84.200.139 port 59648 ssh2
...
2019-09-26 04:53:30
112.186.77.78 attackbotsspam
Sep 25 15:47:19 [host] sshd[29965]: Invalid user tir from 112.186.77.78
Sep 25 15:47:19 [host] sshd[29965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.77.78
Sep 25 15:47:20 [host] sshd[29965]: Failed password for invalid user tir from 112.186.77.78 port 39816 ssh2
2019-09-26 04:23:17
222.129.193.80 attackbotsspam
23/tcp
[2019-09-25]1pkt
2019-09-26 04:24:13
186.31.37.203 attackbots
Sep 25 14:34:29 venus sshd\[12384\]: Invalid user russ from 186.31.37.203 port 35960
Sep 25 14:34:29 venus sshd\[12384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.37.203
Sep 25 14:34:31 venus sshd\[12384\]: Failed password for invalid user russ from 186.31.37.203 port 35960 ssh2
...
2019-09-26 04:18:13
218.92.0.135 attack
ssh brute-force:
** Alert 1569442708.613590: - syslog,access_control,access_denied,
2019 Sep 25 23:18:28 v0gate01->/var/log/secure
Rule: 2503 (level 5) -> 'Connection blocked by Tcp Wrappers.'
Src IP: 218.92.0.135
Sep 25 23:18:26 v0gate01 sshd[7704]: refused connect from 218.92.0.135 (218.92.0.135)
2019-09-26 04:47:39
107.128.103.162 attack
Reported by AbuseIPDB proxy server.
2019-09-26 04:20:59
222.254.34.224 attackspam
445/tcp
[2019-09-25]1pkt
2019-09-26 04:31:12
106.75.103.35 attackbotsspam
Sep 25 02:29:11 sachi sshd\[19776\]: Invalid user de from 106.75.103.35
Sep 25 02:29:11 sachi sshd\[19776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.103.35
Sep 25 02:29:12 sachi sshd\[19776\]: Failed password for invalid user de from 106.75.103.35 port 52606 ssh2
Sep 25 02:34:10 sachi sshd\[20225\]: Invalid user johnny from 106.75.103.35
Sep 25 02:34:10 sachi sshd\[20225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.103.35
2019-09-26 04:32:09
187.85.92.95 attack
84/tcp
[2019-09-25]1pkt
2019-09-26 04:50:44
163.172.229.131 attack
\[2019-09-25 15:53:03\] NOTICE\[1970\] chan_sip.c: Registration from '\' failed for '163.172.229.131:50923' - Wrong password
\[2019-09-25 15:53:03\] SECURITY\[1978\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-25T15:53:03.547-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="9000000",SessionID="0x7f9b34331198",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.229.131/50923",Challenge="66cd2bcc",ReceivedChallenge="66cd2bcc",ReceivedHash="09e80b29fd1561a8002fd9a6c25b69b5"
\[2019-09-25 15:57:41\] NOTICE\[1970\] chan_sip.c: Registration from '\' failed for '163.172.229.131:63179' - Wrong password
\[2019-09-25 15:57:41\] SECURITY\[1978\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-25T15:57:41.396-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4071",SessionID="0x7f9b3403d098",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U
2019-09-26 04:13:55

Recently Reported IPs

104.21.53.124 104.21.53.13 104.21.53.134 104.21.53.131
104.21.53.138 104.21.53.135 104.21.53.122 104.21.53.146
104.21.53.141 104.21.53.145 104.21.53.150 104.21.53.156
104.21.53.160 104.21.53.154 104.21.53.163 104.21.7.238
104.21.53.152 104.21.53.165 104.21.53.170 104.21.53.177