Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.65.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.65.50.			IN	A

;; AUTHORITY SECTION:
.			450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:44:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 50.65.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.65.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.231.54.248 attack
Dec 15 01:37:16 server sshd\[14484\]: Invalid user webftp from 111.231.54.248
Dec 15 01:37:16 server sshd\[14484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.54.248 
Dec 15 01:37:18 server sshd\[14484\]: Failed password for invalid user webftp from 111.231.54.248 port 41027 ssh2
Dec 15 01:51:35 server sshd\[18749\]: Invalid user gangitano from 111.231.54.248
Dec 15 01:51:35 server sshd\[18749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.54.248 
...
2019-12-15 07:52:10
89.87.239.222 attack
Dec 14 22:57:49 server sshd\[697\]: Invalid user bryana from 89.87.239.222
Dec 14 22:57:49 server sshd\[697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89-87-239-222.abo.bbox.fr 
Dec 14 22:57:51 server sshd\[697\]: Failed password for invalid user bryana from 89.87.239.222 port 58878 ssh2
Dec 15 02:13:44 server sshd\[25191\]: Invalid user tauni from 89.87.239.222
Dec 15 02:13:44 server sshd\[25191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89-87-239-222.abo.bbox.fr 
...
2019-12-15 07:56:12
140.143.57.159 attack
Dec 14 23:44:34 h2177944 sshd\[12090\]: Invalid user tsuneji from 140.143.57.159 port 37476
Dec 14 23:44:34 h2177944 sshd\[12090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.159
Dec 14 23:44:36 h2177944 sshd\[12090\]: Failed password for invalid user tsuneji from 140.143.57.159 port 37476 ssh2
Dec 14 23:51:44 h2177944 sshd\[12338\]: Invalid user test from 140.143.57.159 port 38654
...
2019-12-15 07:39:16
209.94.195.212 attackbotsspam
Dec 14 23:41:57 v22018086721571380 sshd[6575]: Failed password for invalid user invoices from 209.94.195.212 port 9384 ssh2
2019-12-15 07:42:18
118.126.128.5 attackbotsspam
Invalid user support from 118.126.128.5 port 60462
2019-12-15 08:00:47
103.253.3.158 attack
Dec 15 01:30:21 sauna sshd[104750]: Failed password for root from 103.253.3.158 port 52480 ssh2
...
2019-12-15 07:49:50
106.54.226.205 attackspambots
Dec 15 01:37:22 sauna sshd[104924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.226.205
Dec 15 01:37:24 sauna sshd[104924]: Failed password for invalid user ir from 106.54.226.205 port 49748 ssh2
...
2019-12-15 07:47:30
125.43.24.193 attack
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-12-15 07:56:32
67.69.134.66 attackbotsspam
Dec 14 12:10:08 server sshd\[2764\]: Failed password for invalid user rehash from 67.69.134.66 port 35180 ssh2
Dec 15 02:29:21 server sshd\[29909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.69.134.66  user=root
Dec 15 02:29:23 server sshd\[29909\]: Failed password for root from 67.69.134.66 port 35223 ssh2
Dec 15 02:36:18 server sshd\[32254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.69.134.66  user=root
Dec 15 02:36:20 server sshd\[32254\]: Failed password for root from 67.69.134.66 port 50768 ssh2
...
2019-12-15 07:45:16
106.52.115.36 attackbots
Invalid user magg from 106.52.115.36 port 49308
2019-12-15 08:01:03
60.30.73.250 attackbots
Dec 14 19:11:50 TORMINT sshd\[4469\]: Invalid user pos from 60.30.73.250
Dec 14 19:11:50 TORMINT sshd\[4469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.30.73.250
Dec 14 19:11:52 TORMINT sshd\[4469\]: Failed password for invalid user pos from 60.30.73.250 port 22032 ssh2
...
2019-12-15 08:17:29
23.96.113.95 attackspam
Invalid user albany from 23.96.113.95 port 34923
2019-12-15 07:52:41
45.82.153.141 attackspam
failed_logins
2019-12-15 08:02:30
89.109.23.190 attack
Dec 15 01:01:44 OPSO sshd\[28701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.23.190  user=mysql
Dec 15 01:01:46 OPSO sshd\[28701\]: Failed password for mysql from 89.109.23.190 port 47940 ssh2
Dec 15 01:07:01 OPSO sshd\[29844\]: Invalid user hung from 89.109.23.190 port 52408
Dec 15 01:07:01 OPSO sshd\[29844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.23.190
Dec 15 01:07:03 OPSO sshd\[29844\]: Failed password for invalid user hung from 89.109.23.190 port 52408 ssh2
2019-12-15 08:09:05
118.24.74.84 attackspambots
Dec 15 05:02:25 vibhu-HP-Z238-Microtower-Workstation sshd\[11275\]: Invalid user jn from 118.24.74.84
Dec 15 05:02:25 vibhu-HP-Z238-Microtower-Workstation sshd\[11275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.74.84
Dec 15 05:02:27 vibhu-HP-Z238-Microtower-Workstation sshd\[11275\]: Failed password for invalid user jn from 118.24.74.84 port 43284 ssh2
Dec 15 05:08:12 vibhu-HP-Z238-Microtower-Workstation sshd\[11698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.74.84  user=gdm
Dec 15 05:08:14 vibhu-HP-Z238-Microtower-Workstation sshd\[11698\]: Failed password for gdm from 118.24.74.84 port 35698 ssh2
...
2019-12-15 07:55:32

Recently Reported IPs

104.21.70.34 104.21.65.5 104.21.65.54 104.21.65.52
104.21.65.57 104.21.65.6 104.21.65.67 104.21.70.35
104.21.65.71 104.21.65.63 104.21.65.81 104.21.65.87
104.21.65.83 104.21.65.9 104.21.65.98 104.21.65.99
104.21.70.39 104.21.66.102 104.21.66.108 104.21.66.111