Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.7.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53865
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.7.139.			IN	A

;; AUTHORITY SECTION:
.			540	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:32:01 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 139.7.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.7.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.167.59 attack
May 21 22:24:50 home sshd[32442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.167.59
May 21 22:24:52 home sshd[32442]: Failed password for invalid user zhangyujie from 159.89.167.59 port 37874 ssh2
May 21 22:28:47 home sshd[726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.167.59
...
2020-05-22 04:41:56
45.143.223.252 attackbots
Brute forcing email accounts
2020-05-22 04:46:35
114.221.194.136 attack
May 21 22:24:28 electroncash sshd[31561]: Invalid user yhr from 114.221.194.136 port 39096
May 21 22:24:28 electroncash sshd[31561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.221.194.136 
May 21 22:24:28 electroncash sshd[31561]: Invalid user yhr from 114.221.194.136 port 39096
May 21 22:24:30 electroncash sshd[31561]: Failed password for invalid user yhr from 114.221.194.136 port 39096 ssh2
May 21 22:28:07 electroncash sshd[32557]: Invalid user nzu from 114.221.194.136 port 36000
...
2020-05-22 05:14:49
3.21.185.184 attackspambots
mue-Direct access to plugin not allowed
2020-05-22 04:55:01
217.170.198.13 attackbotsspam
Automatic report - WordPress Brute Force
2020-05-22 04:45:46
195.84.49.20 attack
May 21 22:52:03 OPSO sshd\[12387\]: Invalid user gyy from 195.84.49.20 port 41298
May 21 22:52:03 OPSO sshd\[12387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.84.49.20
May 21 22:52:05 OPSO sshd\[12387\]: Failed password for invalid user gyy from 195.84.49.20 port 41298 ssh2
May 21 22:55:26 OPSO sshd\[13031\]: Invalid user pkx from 195.84.49.20 port 46996
May 21 22:55:26 OPSO sshd\[13031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.84.49.20
2020-05-22 05:02:11
27.254.68.106 attack
sshd
2020-05-22 05:23:22
45.80.64.246 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2020-05-22 05:18:08
222.186.15.62 attackbots
May 21 23:03:56 OPSO sshd\[14482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
May 21 23:03:59 OPSO sshd\[14482\]: Failed password for root from 222.186.15.62 port 63025 ssh2
May 21 23:04:01 OPSO sshd\[14482\]: Failed password for root from 222.186.15.62 port 63025 ssh2
May 21 23:04:03 OPSO sshd\[14482\]: Failed password for root from 222.186.15.62 port 63025 ssh2
May 21 23:04:04 OPSO sshd\[14501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
2020-05-22 05:07:01
49.233.88.126 attackbotsspam
May 21 22:28:39 santamaria sshd\[20790\]: Invalid user ryg from 49.233.88.126
May 21 22:28:39 santamaria sshd\[20790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.88.126
May 21 22:28:41 santamaria sshd\[20790\]: Failed password for invalid user ryg from 49.233.88.126 port 52416 ssh2
...
2020-05-22 04:46:06
120.132.12.162 attack
2020-05-21T16:07:10.3025761495-001 sshd[35203]: Invalid user cvz from 120.132.12.162 port 38044
2020-05-21T16:07:13.0084771495-001 sshd[35203]: Failed password for invalid user cvz from 120.132.12.162 port 38044 ssh2
2020-05-21T16:10:40.6995901495-001 sshd[35351]: Invalid user eh from 120.132.12.162 port 34805
2020-05-21T16:10:40.7094511495-001 sshd[35351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.12.162
2020-05-21T16:10:40.6995901495-001 sshd[35351]: Invalid user eh from 120.132.12.162 port 34805
2020-05-21T16:10:42.5690871495-001 sshd[35351]: Failed password for invalid user eh from 120.132.12.162 port 34805 ssh2
...
2020-05-22 04:38:38
106.54.224.217 attackbotsspam
2020-05-21T20:38:17.404247server.espacesoutien.com sshd[17158]: Invalid user gpj from 106.54.224.217 port 36512
2020-05-21T20:38:17.418401server.espacesoutien.com sshd[17158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.224.217
2020-05-21T20:38:17.404247server.espacesoutien.com sshd[17158]: Invalid user gpj from 106.54.224.217 port 36512
2020-05-21T20:38:19.757011server.espacesoutien.com sshd[17158]: Failed password for invalid user gpj from 106.54.224.217 port 36512 ssh2
...
2020-05-22 05:21:48
194.26.29.53 attackbots
Port scan on 15 port(s): 3444 3501 3525 3674 3818 4239 4587 4707 4901 5068 5222 5299 5319 5559 5643
2020-05-22 05:14:31
178.128.227.211 attackspam
May 21 23:31:30 ift sshd\[26818\]: Invalid user ofisher from 178.128.227.211May 21 23:31:32 ift sshd\[26818\]: Failed password for invalid user ofisher from 178.128.227.211 port 52212 ssh2May 21 23:36:28 ift sshd\[27797\]: Invalid user dpg from 178.128.227.211May 21 23:36:29 ift sshd\[27797\]: Failed password for invalid user dpg from 178.128.227.211 port 58290 ssh2May 21 23:41:03 ift sshd\[28408\]: Invalid user eoa from 178.128.227.211
...
2020-05-22 04:50:00
94.159.31.10 attackbots
DATE:2020-05-21 22:28:53, IP:94.159.31.10, PORT:ssh SSH brute force auth (docker-dc)
2020-05-22 04:38:10

Recently Reported IPs

104.21.46.26 104.21.46.39 104.21.46.4 104.21.46.56
104.21.46.237 104.21.46.30 104.21.46.34 104.21.46.5
104.21.46.59 104.21.46.60 104.21.46.70 104.21.46.68
104.21.46.77 104.21.46.73 104.21.46.72 104.21.46.65
104.21.46.9 104.21.46.80 104.21.46.86 104.21.46.67