Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.72.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.72.142.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:50:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 142.72.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.72.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
211.137.52.159 attack
Aug 26 04:52:54 shivevps sshd[3976]: Bad protocol version identification 'CONNECT / HTTP/1.1' from 211.137.52.159 port 51443
Aug 26 04:54:45 shivevps sshd[7851]: Bad protocol version identification 'CONNECT / HTTP/1.1' from 211.137.52.159 port 30626
Aug 26 04:54:45 shivevps sshd[7891]: Bad protocol version identification 'CONNECT / HTTP/1.1' from 211.137.52.159 port 34463
...
2020-08-26 13:07:54
180.76.174.197 attackspambots
Aug 26 10:47:35 dhoomketu sshd[2670376]: Failed password for root from 180.76.174.197 port 44698 ssh2
Aug 26 10:51:57 dhoomketu sshd[2670441]: Invalid user eswar from 180.76.174.197 port 37990
Aug 26 10:51:57 dhoomketu sshd[2670441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.174.197 
Aug 26 10:51:57 dhoomketu sshd[2670441]: Invalid user eswar from 180.76.174.197 port 37990
Aug 26 10:51:59 dhoomketu sshd[2670441]: Failed password for invalid user eswar from 180.76.174.197 port 37990 ssh2
...
2020-08-26 13:45:57
170.239.47.251 attackbotsspam
Invalid user develop from 170.239.47.251 port 37400
2020-08-26 13:44:07
81.18.33.26 attackbotsspam
Aug 26 04:52:56 shivevps sshd[4202]: Bad protocol version identification '\024' from 81.18.33.26 port 49732
Aug 26 04:53:03 shivevps sshd[4831]: Bad protocol version identification '\024' from 81.18.33.26 port 49748
Aug 26 04:53:09 shivevps sshd[5100]: Bad protocol version identification '\024' from 81.18.33.26 port 49761
...
2020-08-26 13:42:19
62.210.99.227 attackspam
MYH,DEF GET /wp-login.php
GET /wp-login.php
GET /wp-login.php
GET /wp-login.php
2020-08-26 13:47:32
190.66.3.92 attackspam
Aug 26 02:05:10 firewall sshd[8891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.66.3.92
Aug 26 02:05:10 firewall sshd[8891]: Invalid user sca from 190.66.3.92
Aug 26 02:05:12 firewall sshd[8891]: Failed password for invalid user sca from 190.66.3.92 port 39758 ssh2
...
2020-08-26 13:11:20
221.121.12.238 attackspam
Aug 26 04:52:54 shivevps sshd[3921]: Bad protocol version identification '\024' from 221.121.12.238 port 35190
Aug 26 04:53:01 shivevps sshd[4608]: Bad protocol version identification '\024' from 221.121.12.238 port 35322
Aug 26 04:54:45 shivevps sshd[7861]: Bad protocol version identification '\024' from 221.121.12.238 port 37085
...
2020-08-26 13:10:51
47.17.177.110 attack
Aug 26 07:19:41 fhem-rasp sshd[22579]: Invalid user rx from 47.17.177.110 port 59104
...
2020-08-26 13:20:49
163.172.175.30 attackspambots
Aug 26 04:52:54 shivevps sshd[3997]: Bad protocol version identification '\024' from 163.172.175.30 port 41318
Aug 26 04:53:01 shivevps sshd[4656]: Bad protocol version identification '\024' from 163.172.175.30 port 46962
Aug 26 04:53:07 shivevps sshd[4999]: Bad protocol version identification '\024' from 163.172.175.30 port 51716
...
2020-08-26 13:49:14
118.24.219.30 attackspam
$f2bV_matches
2020-08-26 13:50:35
119.42.68.155 attackbots
Aug 26 04:52:54 shivevps sshd[3965]: Bad protocol version identification '\024' from 119.42.68.155 port 58134
Aug 26 04:53:01 shivevps sshd[4632]: Bad protocol version identification '\024' from 119.42.68.155 port 58443
Aug 26 04:54:44 shivevps sshd[7837]: Bad protocol version identification '\024' from 119.42.68.155 port 34088
...
2020-08-26 13:15:13
51.15.103.83 attackbots
Aug 26 04:52:52 shivevps sshd[3776]: Bad protocol version identification '\024' from 51.15.103.83 port 60034
Aug 26 04:52:53 shivevps sshd[3890]: Bad protocol version identification '\024' from 51.15.103.83 port 60432
Aug 26 04:53:08 shivevps sshd[5032]: Bad protocol version identification '\024' from 51.15.103.83 port 40398
...
2020-08-26 13:48:23
142.4.14.247 attackspam
142.4.14.247 - - [26/Aug/2020:05:54:39 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [26/Aug/2020:05:54:40 +0200] "POST /wp-login.php HTTP/1.1" 200 1811 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [26/Aug/2020:05:54:41 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [26/Aug/2020:05:54:42 +0200] "POST /wp-login.php HTTP/1.1" 200 1799 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [26/Aug/2020:05:54:47 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [26/Aug/2020:05:54:53 +0200] "POST /wp-login.php HTTP/1.1" 200 1798 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/6
...
2020-08-26 13:00:28
49.88.112.76 attackbotsspam
Aug 26 04:48:24 email sshd\[17523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.76  user=root
Aug 26 04:48:26 email sshd\[17523\]: Failed password for root from 49.88.112.76 port 46235 ssh2
Aug 26 04:51:45 email sshd\[18065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.76  user=root
Aug 26 04:51:47 email sshd\[18065\]: Failed password for root from 49.88.112.76 port 34554 ssh2
Aug 26 04:51:50 email sshd\[18065\]: Failed password for root from 49.88.112.76 port 34554 ssh2
...
2020-08-26 13:09:20
163.172.149.116 attack
Aug 26 04:53:01 shivevps sshd[4610]: Bad protocol version identification '\024' from 163.172.149.116 port 43972
Aug 26 04:53:04 shivevps sshd[4837]: Bad protocol version identification '\024' from 163.172.149.116 port 47122
Aug 26 04:54:44 shivevps sshd[7822]: Bad protocol version identification '\024' from 163.172.149.116 port 43160
...
2020-08-26 13:17:08

Recently Reported IPs

104.21.72.135 104.21.72.139 104.21.72.14 104.21.72.140
104.21.72.143 104.21.72.145 104.21.72.147 104.21.72.146
104.21.72.148 104.21.72.154 104.21.72.151 104.21.72.153
104.21.72.150 104.21.72.157 104.21.72.152 104.21.72.159
104.21.72.16 104.21.72.156 140.122.23.24 104.21.72.149