Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.69.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.69.142.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:46:54 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 142.69.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.69.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.161.107.110 attack
SP-Scan 43811:23 detected 2020.08.26 20:12:27
blocked until 2020.10.15 13:15:14
2020-08-27 09:35:09
193.27.229.190 attackspambots
Fail2Ban Ban Triggered
2020-08-27 09:33:41
45.232.244.5 attackbotsspam
Aug 24 13:29:05 hostnameis sshd[35936]: Invalid user linas from 45.232.244.5
Aug 24 13:29:05 hostnameis sshd[35936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.244.5 
Aug 24 13:29:07 hostnameis sshd[35936]: Failed password for invalid user linas from 45.232.244.5 port 38468 ssh2
Aug 24 13:29:07 hostnameis sshd[35936]: Received disconnect from 45.232.244.5: 11: Bye Bye [preauth]
Aug 24 15:42:52 hostnameis sshd[36507]: Invalid user agro from 45.232.244.5
Aug 24 15:42:52 hostnameis sshd[36507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.244.5 
Aug 24 15:42:54 hostnameis sshd[36507]: Failed password for invalid user agro from 45.232.244.5 port 33016 ssh2
Aug 24 15:42:55 hostnameis sshd[36507]: Received disconnect from 45.232.244.5: 11: Bye Bye [preauth]
Aug 24 15:47:51 hostnameis sshd[36535]: Invalid user blade from 45.232.244.5
Aug 24 15:47:51 hostnameis sshd[36535]: pam_........
------------------------------
2020-08-27 09:41:38
210.140.172.181 attackbots
Aug 27 01:05:29 fhem-rasp sshd[32206]: Invalid user anirudh from 210.140.172.181 port 46497
...
2020-08-27 09:31:33
138.197.12.179 attackspam
Aug 24 07:52:30 xxxxxxx9247313 sshd[14912]: Invalid user gjf from 138.197.12.179
Aug 24 07:52:30 xxxxxxx9247313 sshd[14912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=box.computerfahostnameh.com 
Aug 24 07:52:32 xxxxxxx9247313 sshd[14912]: Failed password for invalid user gjf from 138.197.12.179 port 39630 ssh2
Aug 24 07:54:19 xxxxxxx9247313 sshd[14931]: Invalid user tommy from 138.197.12.179
Aug 24 07:54:19 xxxxxxx9247313 sshd[14931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=box.computerfahostnameh.com 
Aug 24 07:54:21 xxxxxxx9247313 sshd[14931]: Failed password for invalid user tommy from 138.197.12.179 port 60660 ssh2
Aug 24 07:55:20 xxxxxxx9247313 sshd[15013]: Invalid user testmail from 138.197.12.179
Aug 24 07:55:20 xxxxxxx9247313 sshd[15013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=box.computerfahostnameh.com 
Aug 24 07:55:22 ........
------------------------------
2020-08-27 09:37:41
128.199.162.108 attackspambots
2020-08-27T01:11:03.138090shield sshd\[3406\]: Invalid user 0d00 from 128.199.162.108 port 32978
2020-08-27T01:11:03.147245shield sshd\[3406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.108
2020-08-27T01:11:05.458852shield sshd\[3406\]: Failed password for invalid user 0d00 from 128.199.162.108 port 32978 ssh2
2020-08-27T01:14:42.125784shield sshd\[4272\]: Invalid user 123456789 from 128.199.162.108 port 38124
2020-08-27T01:14:42.156113shield sshd\[4272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.108
2020-08-27 09:19:43
81.70.9.97 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-27 09:25:37
193.35.51.20 attack
Aug 27 03:48:10 galaxy event: galaxy/lswi: smtp: sander@wirtschaftsinformatik-potsdam.de [193.35.51.20] authentication failure using internet password
Aug 27 03:48:12 galaxy event: galaxy/lswi: smtp: sander [193.35.51.20] authentication failure using internet password
Aug 27 03:48:33 galaxy event: galaxy/lswi: smtp: ulrich@wirtschaftsinformatik-potsdam.de [193.35.51.20] authentication failure using internet password
Aug 27 03:48:34 galaxy event: galaxy/lswi: smtp: ulrich [193.35.51.20] authentication failure using internet password
Aug 27 03:48:37 galaxy event: galaxy/lswi: smtp: christine@wirtschaftsinformatik-potsdam.de [193.35.51.20] authentication failure using internet password
...
2020-08-27 09:51:11
66.240.192.138 attack
[Wed Aug 19 18:17:00 2020] - DDoS Attack From IP: 66.240.192.138 Port: 28693
2020-08-27 09:46:13
2a02:a03f:3a4e:bb00:9945:113b:ae6:1db4 attackbots
Aug 26 22:48:05 server dovecot: imap-login: Aborted login (auth failed, 1 attempts in 3 secs): user=, method=PLAIN, rip=2a02:a03f:3a4e:bb00:9945:113b:ae6:1db4, lip=2a01:7e01:e001:164::, session=
Aug 26 22:48:05 server dovecot: imap-login: Aborted login (auth failed, 1 attempts in 3 secs): user=, method=PLAIN, rip=2a02:a03f:3a4e:bb00:9945:113b:ae6:1db4, lip=2a01:7e01:e001:164::, session=
Aug 26 22:48:12 server dovecot: imap-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=2a02:a03f:3a4e:bb00:9945:113b:ae6:1db4, lip=2a01:7e01:e001:164::, session=<3sUD8M2tFsgqAqA/Ok67AJlFETsK5h20>
Aug 26 22:48:14 server dovecot: imap-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=2a02:a03f:3a4e:bb00:9945:113b:ae6:1db4, lip=2a01:7e01:e001:164::, session=
2020-08-27 09:15:14
183.88.232.183 attackspam
$f2bV_matches
2020-08-27 09:49:09
138.36.168.158 attack
SS5,DEF GET /phpmyadmin/
2020-08-27 09:27:13
176.31.226.188 attackbots
[2020-08-26 17:29:53] NOTICE[1185] chan_sip.c: Registration from '"55" ' failed for '176.31.226.188:6027' - Wrong password
[2020-08-26 17:29:53] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-26T17:29:53.842-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="55",SessionID="0x7f10c451d0c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/176.31.226.188/6027",Challenge="4d30fa28",ReceivedChallenge="4d30fa28",ReceivedHash="c0a48fa782a259e78bc317c771f084d9"
[2020-08-26 17:29:53] NOTICE[1185] chan_sip.c: Registration from '"55" ' failed for '176.31.226.188:6027' - Wrong password
[2020-08-26 17:29:53] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-26T17:29:53.957-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="55",SessionID="0x7f10c46d4728",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/176.31.226.
...
2020-08-27 09:35:48
218.62.80.29 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-27 09:32:32
124.109.51.179 attack
IP 124.109.51.179 attacked honeypot on port: 1433 at 8/26/2020 5:11:05 PM
2020-08-27 09:38:15

Recently Reported IPs

104.21.69.145 104.21.69.136 104.21.69.144 104.21.69.15
254.125.192.70 104.21.69.157 104.21.69.151 104.21.69.146
104.21.71.102 104.21.69.163 104.21.69.160 104.21.69.16
104.21.69.159 104.21.69.17 104.21.69.166 104.21.69.175
104.21.71.104 104.21.69.183 104.21.69.180 104.21.69.186