Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.64.248 spam
Spammer Website using 104.21.64.248
2022-09-19 03:38:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.6.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.6.66.			IN	A

;; AUTHORITY SECTION:
.			389	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:02:32 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 66.6.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.6.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.165.213.92 attackbotsspam
Lines containing failures of 66.165.213.92
Feb  3 22:41:56 nextcloud sshd[31542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.165.213.92  user=r.r
Feb  3 22:41:58 nextcloud sshd[31542]: Failed password for r.r from 66.165.213.92 port 53033 ssh2
Feb  3 22:41:59 nextcloud sshd[31542]: Received disconnect from 66.165.213.92 port 53033:11: Bye Bye [preauth]
Feb  3 22:41:59 nextcloud sshd[31542]: Disconnected from authenticating user r.r 66.165.213.92 port 53033 [preauth]
Feb  3 22:54:57 nextcloud sshd[32753]: Invalid user server from 66.165.213.92 port 52226
Feb  3 22:54:57 nextcloud sshd[32753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.165.213.92
Feb  3 22:54:59 nextcloud sshd[32753]: Failed password for invalid user server from 66.165.213.92 port 52226 ssh2
Feb  3 22:55:00 nextcloud sshd[32753]: Received disconnect from 66.165.213.92 port 52226:11: Bye Bye [preauth]
Feb  3 22:5........
------------------------------
2020-02-04 08:56:39
161.129.66.242 attackspam
fell into ViewStateTrap:oslo
2020-02-04 09:26:12
138.255.144.87 attack
Feb  4 01:06:18 grey postfix/smtpd\[5530\]: NOQUEUE: reject: RCPT from unknown\[138.255.144.87\]: 554 5.7.1 Service unavailable\; Client host \[138.255.144.87\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=138.255.144.87\; from=\ to=\ proto=ESMTP helo=\<\[138.255.144.87\]\>
...
2020-02-04 09:21:16
64.52.87.27 attack
Feb  4 01:35:38 Ubuntu-1404-trusty-64-minimal sshd\[14856\]: Invalid user ftp from 64.52.87.27
Feb  4 01:35:38 Ubuntu-1404-trusty-64-minimal sshd\[14856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.52.87.27
Feb  4 01:35:40 Ubuntu-1404-trusty-64-minimal sshd\[14856\]: Failed password for invalid user ftp from 64.52.87.27 port 59464 ssh2
Feb  4 01:37:05 Ubuntu-1404-trusty-64-minimal sshd\[15249\]: Invalid user wp-user from 64.52.87.27
Feb  4 01:37:05 Ubuntu-1404-trusty-64-minimal sshd\[15249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.52.87.27
2020-02-04 09:25:34
78.202.180.74 attackspam
TCP port 1514: Scan and connection
2020-02-04 09:30:09
183.13.120.121 attackspambots
Feb  4 01:55:14 dedicated sshd[13070]: Invalid user lr from 183.13.120.121 port 36374
2020-02-04 09:10:48
95.167.243.148 attack
Feb  4 01:33:18 markkoudstaal sshd[3797]: Failed password for list from 95.167.243.148 port 56903 ssh2
Feb  4 01:37:06 markkoudstaal sshd[4521]: Failed password for root from 95.167.243.148 port 43250 ssh2
2020-02-04 08:59:24
134.209.41.198 attackbots
Unauthorized connection attempt detected from IP address 134.209.41.198 to port 2220 [J]
2020-02-04 09:08:26
189.122.211.35 attackspam
Automatic report - SSH Brute-Force Attack
2020-02-04 09:14:36
76.127.249.38 attackspam
SSH bruteforce (Triggered fail2ban)
2020-02-04 09:19:03
86.183.143.138 attack
Unauthorized connection attempt detected from IP address 86.183.143.138 to port 23 [J]
2020-02-04 08:51:02
162.243.129.130 attack
Unauthorized connection attempt detected from IP address 162.243.129.130 to port 26
2020-02-04 09:33:41
82.64.177.46 attack
Feb  4 01:10:07 vmd17057 sshd\[4232\]: Invalid user admin from 82.64.177.46 port 57635
Feb  4 01:10:07 vmd17057 sshd\[4232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.177.46
Feb  4 01:10:09 vmd17057 sshd\[4232\]: Failed password for invalid user admin from 82.64.177.46 port 57635 ssh2
...
2020-02-04 09:26:37
136.232.106.58 attackspam
Feb  4 01:12:24 mail sshd[11860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.232.106.58 
Feb  4 01:12:26 mail sshd[11860]: Failed password for invalid user chloe from 136.232.106.58 port 54085 ssh2
Feb  4 01:18:50 mail sshd[12985]: Failed password for root from 136.232.106.58 port 54039 ssh2
2020-02-04 08:54:40
121.144.4.34 attackbotsspam
Feb  4 00:56:10 mail postfix/smtpd[6563]: warning: unknown[121.144.4.34]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 01:01:03 mail postfix/smtpd[7300]: warning: unknown[121.144.4.34]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 01:02:26 mail postfix/smtpd[7048]: warning: unknown[121.144.4.34]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-02-04 08:54:55

Recently Reported IPs

1.33.169.80 1.32.117.181 1.34.157.138 1.34.190.217
1.33.203.150 1.34.128.246 1.34.223.172 1.34.197.14
1.34.100.5 1.34.226.151 1.32.47.11 1.34.93.204
104.21.6.67 1.36.42.43 1.4.152.43 1.36.160.235
1.4.147.67 1.4.159.169 1.36.46.77 1.38.143.13