Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.72.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.72.16.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:50:37 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 16.72.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.72.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.79.86.177 attack
srv02 SSH BruteForce Attacks 22 ..
2020-07-10 04:01:56
103.74.16.248 attackspam
103.74.16.248 - - [09/Jul/2020:21:20:41 +0100] "POST /wp-login.php HTTP/1.1" 200 7675 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
103.74.16.248 - - [09/Jul/2020:21:21:38 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
103.74.16.248 - - [09/Jul/2020:21:21:40 +0100] "POST /wp-login.php HTTP/1.1" 200 7820 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-07-10 04:28:05
209.85.233.26 attackspambots
SSH login attempts.
2020-07-10 04:04:46
69.168.106.44 attack
SSH login attempts.
2020-07-10 04:20:56
180.166.117.254 attack
Jul  9 22:19:22 piServer sshd[20341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.117.254 
Jul  9 22:19:24 piServer sshd[20341]: Failed password for invalid user zhongyalin from 180.166.117.254 port 47371 ssh2
Jul  9 22:21:37 piServer sshd[20526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.117.254 
...
2020-07-10 04:31:08
88.73.176.169 attack
Jul  9 20:16:08 localhost sshd[110481]: Invalid user zunwen from 88.73.176.169 port 43108
Jul  9 20:16:08 localhost sshd[110481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dslb-088-073-176-169.088.073.pools.vodafone-ip.de
Jul  9 20:16:08 localhost sshd[110481]: Invalid user zunwen from 88.73.176.169 port 43108
Jul  9 20:16:11 localhost sshd[110481]: Failed password for invalid user zunwen from 88.73.176.169 port 43108 ssh2
Jul  9 20:21:44 localhost sshd[111131]: Invalid user gitlab-psql from 88.73.176.169 port 41058
...
2020-07-10 04:23:41
201.116.194.210 attack
Jul  9 21:57:10 santamaria sshd\[23263\]: Invalid user composer from 201.116.194.210
Jul  9 21:57:10 santamaria sshd\[23263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.194.210
Jul  9 21:57:11 santamaria sshd\[23263\]: Failed password for invalid user composer from 201.116.194.210 port 34019 ssh2
...
2020-07-10 04:11:54
67.231.144.99 attack
SSH login attempts.
2020-07-10 04:16:12
193.112.191.228 attack
2020-07-09T15:54:24+0200 Failed SSH Authentication/Brute Force Attack. (Server 10)
2020-07-10 04:03:36
66.249.155.244 attack
Jul 10 06:21:43 localhost sshd[1424324]: Disconnected from authenticating user mail 66.249.155.244 port 35844 [preauth]
...
2020-07-10 04:25:39
217.97.216.15 attack
SSH login attempts.
2020-07-10 03:58:44
170.130.48.37 attack
2020-07-09 06:38:44.794260-0500  localhost smtpd[7768]: NOQUEUE: reject: RCPT from unknown[170.130.48.37]: 450 4.7.25 Client host rejected: cannot find your hostname, [170.130.48.37]; from= to= proto=ESMTP helo=<00ea89c0.sonusheal.xyz>
2020-07-10 04:00:13
91.216.107.237 attackbotsspam
SSH login attempts.
2020-07-10 04:19:15
46.164.143.82 attackbots
Jul  9 14:34:24 srv-ubuntu-dev3 sshd[82984]: Invalid user test from 46.164.143.82
Jul  9 14:34:24 srv-ubuntu-dev3 sshd[82984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.164.143.82
Jul  9 14:34:24 srv-ubuntu-dev3 sshd[82984]: Invalid user test from 46.164.143.82
Jul  9 14:34:26 srv-ubuntu-dev3 sshd[82984]: Failed password for invalid user test from 46.164.143.82 port 37144 ssh2
Jul  9 14:37:35 srv-ubuntu-dev3 sshd[83623]: Invalid user sepp from 46.164.143.82
Jul  9 14:37:35 srv-ubuntu-dev3 sshd[83623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.164.143.82
Jul  9 14:37:35 srv-ubuntu-dev3 sshd[83623]: Invalid user sepp from 46.164.143.82
Jul  9 14:37:37 srv-ubuntu-dev3 sshd[83623]: Failed password for invalid user sepp from 46.164.143.82 port 34680 ssh2
Jul  9 14:40:45 srv-ubuntu-dev3 sshd[84055]: Invalid user test from 46.164.143.82
...
2020-07-10 04:16:27
103.36.103.48 attackbotsspam
invalid login attempt (sakib)
2020-07-10 04:35:22

Recently Reported IPs

104.21.72.159 104.21.72.156 140.122.23.24 104.21.72.149
104.21.72.160 104.21.72.165 104.21.72.166 104.21.72.17
104.21.72.164 104.21.72.167 104.21.72.163 104.21.72.161
104.21.72.170 104.21.72.169 104.21.72.168 104.21.72.171
104.21.72.172 104.21.72.173 104.21.72.177 104.21.72.174