Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.64.248 spam
Spammer Website using 104.21.64.248
2022-09-19 03:38:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.6.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.6.147.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:39:46 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 147.6.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.6.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
168.90.52.23 attackbotsspam
Invalid user hk from 168.90.52.23 port 57314
2019-08-12 20:22:35
183.6.176.182 attackbotsspam
Aug 12 12:04:40 rpi sshd[10749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.6.176.182 
Aug 12 12:04:42 rpi sshd[10749]: Failed password for invalid user ftp from 183.6.176.182 port 36517 ssh2
2019-08-12 19:52:10
91.82.42.197 attackbotsspam
Aug 12 01:18:59 rigel postfix/smtpd[9173]: warning: hostname keve-82-197.pool.kevenet.hu does not resolve to address 91.82.42.197: Name or service not known
Aug 12 01:18:59 rigel postfix/smtpd[9173]: connect from unknown[91.82.42.197]
Aug 12 01:19:00 rigel postfix/smtpd[9173]: warning: unknown[91.82.42.197]: SASL CRAM-MD5 authentication failed: authentication failure
Aug 12 01:19:00 rigel postfix/smtpd[9173]: warning: unknown[91.82.42.197]: SASL PLAIN authentication failed: authentication failure
Aug 12 01:19:00 rigel postfix/smtpd[9173]: warning: unknown[91.82.42.197]: SASL LOGIN authentication failed: authentication failure
Aug 12 01:19:00 rigel postfix/smtpd[9173]: disconnect from unknown[91.82.42.197]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.82.42.197
2019-08-12 19:39:23
134.73.76.196 attack
Postfix RBL failed
2019-08-12 19:54:48
201.159.97.205 attackbots
Unauthorised access (Aug 12) SRC=201.159.97.205 LEN=52 TOS=0x08 PREC=0x20 TTL=108 ID=7378 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-12 19:37:25
103.207.39.21 attack
Aug 12 11:54:39 andromeda postfix/smtpd\[25455\]: warning: unknown\[103.207.39.21\]: SASL LOGIN authentication failed: authentication failure
Aug 12 11:54:41 andromeda postfix/smtpd\[25455\]: warning: unknown\[103.207.39.21\]: SASL LOGIN authentication failed: authentication failure
Aug 12 11:54:42 andromeda postfix/smtpd\[25455\]: warning: unknown\[103.207.39.21\]: SASL LOGIN authentication failed: authentication failure
Aug 12 11:54:43 andromeda postfix/smtpd\[25455\]: warning: unknown\[103.207.39.21\]: SASL LOGIN authentication failed: authentication failure
Aug 12 11:54:45 andromeda postfix/smtpd\[25455\]: warning: unknown\[103.207.39.21\]: SASL LOGIN authentication failed: authentication failure
2019-08-12 19:43:58
110.249.254.66 attack
2019-08-12T11:20:08.367203  sshd[11657]: Invalid user pk from 110.249.254.66 port 53046
2019-08-12T11:20:08.382965  sshd[11657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.249.254.66
2019-08-12T11:20:08.367203  sshd[11657]: Invalid user pk from 110.249.254.66 port 53046
2019-08-12T11:20:10.260112  sshd[11657]: Failed password for invalid user pk from 110.249.254.66 port 53046 ssh2
2019-08-12T11:26:13.787959  sshd[11711]: Invalid user anathan from 110.249.254.66 port 35202
...
2019-08-12 19:48:13
46.105.59.149 attackspambots
NAME : OVH CIDR : 46.105.32.0/19 SYN Flood DDoS Attack France - block certain countries :) IP: 46.105.59.149  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-12 19:41:24
72.178.161.232 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-12 20:13:53
103.23.35.77 attackspambots
Aug 11 20:26:54 mail postfix/postscreen[25215]: PREGREET 16 after 0.61 from [103.23.35.77]:55529: EHLO lovess.it

...
2019-08-12 19:53:03
103.30.81.197 attackbotsspam
Aug 12 02:23:04 rigel postfix/smtpd[9266]: connect from unknown[103.30.81.197]
Aug 12 02:23:07 rigel postfix/smtpd[9266]: warning: unknown[103.30.81.197]: SASL CRAM-MD5 authentication failed: authentication failure
Aug 12 02:23:07 rigel postfix/smtpd[9266]: warning: unknown[103.30.81.197]: SASL PLAIN authentication failed: authentication failure
Aug 12 02:23:08 rigel postfix/smtpd[9266]: warning: unknown[103.30.81.197]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.30.81.197
2019-08-12 20:21:18
112.85.42.174 attack
Aug 12 13:13:23 minden010 sshd[2760]: Failed password for root from 112.85.42.174 port 25041 ssh2
Aug 12 13:13:26 minden010 sshd[2760]: Failed password for root from 112.85.42.174 port 25041 ssh2
Aug 12 13:13:37 minden010 sshd[2760]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 25041 ssh2 [preauth]
...
2019-08-12 20:02:34
41.76.149.212 attack
2019-08-12T03:14:45.706020abusebot-4.cloudsearch.cf sshd\[24093\]: Invalid user mysql from 41.76.149.212 port 56468
2019-08-12 20:00:16
46.107.146.125 attack
Automatic report - Port Scan Attack
2019-08-12 19:59:53
178.128.214.153 attackspambots
Unauthorized connection attempt from IP address 178.128.214.153 on Port 3389(RDP)
2019-08-12 19:51:49

Recently Reported IPs

104.21.6.142 104.21.6.152 104.21.6.157 104.21.70.110
104.21.6.16 104.21.6.163 104.21.6.151 104.21.6.155
104.21.6.143 104.21.6.15 215.66.143.23 104.21.6.169
104.21.6.164 104.21.6.171 104.21.6.181 104.21.70.111
104.21.6.182 104.21.6.178 104.21.6.191 104.21.6.195