Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.68.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35792
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.68.60.			IN	A

;; AUTHORITY SECTION:
.			349	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:20:21 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 60.68.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 60.68.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.225.159.30 attackspambots
Jan 13 17:33:08 Tower sshd[12735]: Connection from 104.225.159.30 port 56720 on 192.168.10.220 port 22 rdomain ""
Jan 13 17:33:08 Tower sshd[12735]: Invalid user teste from 104.225.159.30 port 56720
Jan 13 17:33:08 Tower sshd[12735]: error: Could not get shadow information for NOUSER
Jan 13 17:33:08 Tower sshd[12735]: Failed password for invalid user teste from 104.225.159.30 port 56720 ssh2
Jan 13 17:33:08 Tower sshd[12735]: Received disconnect from 104.225.159.30 port 56720:11: Bye Bye [preauth]
Jan 13 17:33:08 Tower sshd[12735]: Disconnected from invalid user teste 104.225.159.30 port 56720 [preauth]
2020-01-14 07:54:25
51.77.185.5 attackspambots
2020-01-13T18:27:57.985819xentho-1 sshd[520653]: Invalid user sg from 51.77.185.5 port 38286
2020-01-13T18:27:57.993888xentho-1 sshd[520653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.185.5
2020-01-13T18:27:57.985819xentho-1 sshd[520653]: Invalid user sg from 51.77.185.5 port 38286
2020-01-13T18:28:00.105948xentho-1 sshd[520653]: Failed password for invalid user sg from 51.77.185.5 port 38286 ssh2
2020-01-13T18:30:15.580035xentho-1 sshd[520702]: Invalid user test from 51.77.185.5 port 33104
2020-01-13T18:30:15.588913xentho-1 sshd[520702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.185.5
2020-01-13T18:30:15.580035xentho-1 sshd[520702]: Invalid user test from 51.77.185.5 port 33104
2020-01-13T18:30:17.983050xentho-1 sshd[520702]: Failed password for invalid user test from 51.77.185.5 port 33104 ssh2
2020-01-13T18:32:37.329980xentho-1 sshd[520724]: Invalid user ry from 51.77.185.5 port 5
...
2020-01-14 08:11:50
1.6.114.75 attack
Jan 13 21:20:37 raspberrypi sshd\[24023\]: Failed password for root from 1.6.114.75 port 53230 ssh2Jan 13 21:21:58 raspberrypi sshd\[24052\]: Invalid user maneesh from 1.6.114.75Jan 13 21:22:01 raspberrypi sshd\[24052\]: Failed password for invalid user maneesh from 1.6.114.75 port 36018 ssh2
...
2020-01-14 07:43:55
59.56.110.27 attackbotsspam
Jan 14 00:10:13 vps58358 sshd\[12715\]: Invalid user hadoop from 59.56.110.27Jan 14 00:10:15 vps58358 sshd\[12715\]: Failed password for invalid user hadoop from 59.56.110.27 port 44168 ssh2Jan 14 00:15:00 vps58358 sshd\[12785\]: Invalid user jarvis from 59.56.110.27Jan 14 00:15:02 vps58358 sshd\[12785\]: Failed password for invalid user jarvis from 59.56.110.27 port 47328 ssh2Jan 14 00:19:45 vps58358 sshd\[12850\]: Invalid user aldair from 59.56.110.27Jan 14 00:19:47 vps58358 sshd\[12850\]: Failed password for invalid user aldair from 59.56.110.27 port 50486 ssh2
...
2020-01-14 08:13:58
14.191.128.209 attack
...
2020-01-14 07:43:43
167.71.229.19 attackspam
2020-01-14 01:03:53,090 fail2ban.actions: WARNING [ssh] Ban 167.71.229.19
2020-01-14 08:08:04
91.92.191.61 attackbots
Unauthorized connection attempt detected from IP address 91.92.191.61 to port 2220 [J]
2020-01-14 07:49:41
218.65.35.26 attackspambots
" "
2020-01-14 08:13:06
46.99.67.5 attackbotsspam
Jan 13 22:21:11 linuxrulz sshd[18941]: Invalid user user from 46.99.67.5 port 42247
Jan 13 22:21:11 linuxrulz sshd[18941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.99.67.5
Jan 13 22:21:14 linuxrulz sshd[18941]: Failed password for invalid user user from 46.99.67.5 port 42247 ssh2
Jan 13 22:21:14 linuxrulz sshd[18941]: Connection closed by 46.99.67.5 port 42247 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.99.67.5
2020-01-14 08:01:46
185.175.93.18 attackbotsspam
Multiport scan : 17 ports scanned 2789 3989 10789 11089 21189 21689 28389 34389 36489 41089 42689 44689 53589 57489 57989 59289 60689
2020-01-14 07:44:30
63.80.184.88 attackbots
Jan 13 23:21:42 grey postfix/smtpd\[9048\]: NOQUEUE: reject: RCPT from cure.sapuxfiori.com\[63.80.184.88\]: 554 5.7.1 Service unavailable\; Client host \[63.80.184.88\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.80.184.88\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-14 08:03:42
197.210.52.164 attackbotsspam
Unauthorized connection attempt detected from IP address 197.210.52.164 to port 445
2020-01-14 08:00:47
179.186.29.52 attackbots
Automatic report - Port Scan Attack
2020-01-14 07:44:59
210.245.87.199 attackbotsspam
Jan 13 22:20:19 mxgate1 postfix/postscreen[2524]: CONNECT from [210.245.87.199]:52739 to [176.31.12.44]:25
Jan 13 22:20:19 mxgate1 postfix/dnsblog[2667]: addr 210.245.87.199 listed by domain zen.spamhaus.org as 127.0.0.2
Jan 13 22:20:19 mxgate1 postfix/dnsblog[2666]: addr 210.245.87.199 listed by domain b.barracudacentral.org as 127.0.0.2
Jan 13 22:20:25 mxgate1 postfix/postscreen[2524]: DNSBL rank 3 for [210.245.87.199]:52739
Jan x@x
Jan 13 22:20:26 mxgate1 postfix/postscreen[2524]: DISCONNECT [210.245.87.199]:52739


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=210.245.87.199
2020-01-14 07:59:03
222.186.42.155 attackspambots
SSH bruteforce
2020-01-14 08:07:02

Recently Reported IPs

104.21.26.172 104.21.26.169 104.21.26.159 104.21.26.151
104.21.26.155 104.21.26.162 104.21.26.174 104.21.26.196
104.21.26.191 104.21.26.198 104.21.26.208 104.21.26.186
104.21.26.213 104.21.26.219 104.21.26.218 104.21.26.206
104.21.26.207 104.21.26.205 104.21.26.221 104.21.68.61