Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.7.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.7.67.			IN	A

;; AUTHORITY SECTION:
.			323	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:48:21 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 67.7.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.7.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
74.120.14.73 attackbots
 TCP (SYN) 74.120.14.73:43233 -> port 5090, len 44
2020-09-18 01:05:22
138.197.171.79 attackspambots
Sep 17 16:03:47 ip106 sshd[12240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.171.79 
Sep 17 16:03:49 ip106 sshd[12240]: Failed password for invalid user ofsaa123 from 138.197.171.79 port 39162 ssh2
...
2020-09-18 01:12:29
51.83.41.120 attackbotsspam
Sep 17 16:49:33 localhost sshd\[21252\]: Invalid user praysner from 51.83.41.120 port 55422
Sep 17 16:49:33 localhost sshd\[21252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.41.120
Sep 17 16:49:35 localhost sshd\[21252\]: Failed password for invalid user praysner from 51.83.41.120 port 55422 ssh2
...
2020-09-18 00:51:05
61.154.97.141 attackbotsspam
2020-09-17T04:41:54.966976beta postfix/smtpd[27013]: warning: unknown[61.154.97.141]: SASL LOGIN authentication failed: authentication failure
2020-09-17T04:42:01.184951beta postfix/smtpd[27013]: warning: unknown[61.154.97.141]: SASL LOGIN authentication failed: authentication failure
2020-09-17T04:42:07.832506beta postfix/smtpd[27013]: warning: unknown[61.154.97.141]: SASL LOGIN authentication failed: authentication failure
...
2020-09-18 00:47:05
110.164.151.100 attackbots
Unauthorized connection attempt from IP address 110.164.151.100 on Port 445(SMB)
2020-09-18 00:48:40
42.194.203.226 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-18 01:10:27
112.85.42.181 attack
Sep 17 18:53:59 ucs sshd\[19684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
Sep 17 18:54:00 ucs sshd\[19681\]: error: PAM: User not known to the underlying authentication module for root from 112.85.42.181
Sep 17 18:54:02 ucs sshd\[19706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
...
2020-09-18 01:00:53
183.136.225.45 attack
 TCP (SYN) 183.136.225.45:50546 -> port 49151, len 44
2020-09-18 00:43:55
106.54.219.237 attackbots
Invalid user mongodb from 106.54.219.237 port 33311
2020-09-18 00:57:46
117.239.4.147 attackspam
Unauthorised access (Sep 16) SRC=117.239.4.147 LEN=52 TTL=108 ID=8031 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-18 00:52:36
140.143.57.195 attackspam
2020-09-17T17:49:41.180330mail.broermann.family sshd[5714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.195  user=root
2020-09-17T17:49:43.273900mail.broermann.family sshd[5714]: Failed password for root from 140.143.57.195 port 46620 ssh2
2020-09-17T17:53:19.731350mail.broermann.family sshd[5876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.195  user=root
2020-09-17T17:53:22.084032mail.broermann.family sshd[5876]: Failed password for root from 140.143.57.195 port 55882 ssh2
2020-09-17T18:00:25.779048mail.broermann.family sshd[6188]: Invalid user mikel from 140.143.57.195 port 46180
...
2020-09-18 00:42:48
61.218.5.190 attackspambots
2020-09-17T07:58:09.352359linuxbox-skyline sshd[19323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.218.5.190  user=root
2020-09-17T07:58:11.085289linuxbox-skyline sshd[19323]: Failed password for root from 61.218.5.190 port 41346 ssh2
...
2020-09-18 01:16:15
115.99.89.9 attack
Port probing on unauthorized port 23
2020-09-18 01:17:41
144.172.93.157 attackbots
2020-09-16 12:03:40.217683-0500  localhost smtpd[40120]: NOQUEUE: reject: RCPT from unknown[144.172.93.157]: 554 5.7.1 Service unavailable; Client host [144.172.93.157] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2020-09-18 00:45:44
52.50.187.101 attack
52.50.187.101 - - [16/Sep/2020:19:56:39 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.50.187.101 - - [16/Sep/2020:19:56:39 +0100] "POST /wp-login.php HTTP/1.1" 200 2000 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.50.187.101 - - [16/Sep/2020:19:56:39 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-18 01:18:25

Recently Reported IPs

104.21.7.63 104.21.7.64 104.21.7.68 104.21.7.71
104.21.7.75 104.21.7.74 104.21.71.145 104.21.7.81
104.21.7.79 104.21.7.8 104.21.7.78 104.21.7.82
104.21.7.87 104.21.7.91 104.21.7.92 104.21.7.95
104.21.70.10 104.21.71.149 104.21.70.109 104.21.70.115