Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.72.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.72.92.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:51:28 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 92.72.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 92.72.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.142.192.18 attackbotsspam
Jul 31 15:48:55 localhost sshd\[32226\]: Invalid user raluca from 123.142.192.18 port 54850
Jul 31 15:48:55 localhost sshd\[32226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.192.18
Jul 31 15:48:58 localhost sshd\[32226\]: Failed password for invalid user raluca from 123.142.192.18 port 54850 ssh2
...
2019-08-01 02:45:47
222.180.162.8 attackbots
Invalid user user03 from 222.180.162.8 port 52713
2019-08-01 02:40:01
95.85.60.251 attack
Invalid user nova from 95.85.60.251 port 55970
2019-08-01 02:36:18
167.99.77.255 attack
[Aegis] @ 2019-07-31 18:34:42  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-08-01 02:10:11
129.204.76.157 attackspambots
Jul  6 18:48:47 dallas01 sshd[18326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.76.157
Jul  6 18:48:48 dallas01 sshd[18326]: Failed password for invalid user ftpuser from 129.204.76.157 port 59548 ssh2
Jul  6 18:51:15 dallas01 sshd[18739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.76.157
2019-08-01 02:34:03
104.168.236.207 attackspambots
Jul 31 20:35:33 herz-der-gamer sshd[23343]: Invalid user oracle from 104.168.236.207 port 46720
Jul 31 20:35:33 herz-der-gamer sshd[23343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.236.207
Jul 31 20:35:33 herz-der-gamer sshd[23343]: Invalid user oracle from 104.168.236.207 port 46720
Jul 31 20:35:35 herz-der-gamer sshd[23343]: Failed password for invalid user oracle from 104.168.236.207 port 46720 ssh2
...
2019-08-01 02:47:20
34.73.39.215 attack
Invalid user alex from 34.73.39.215 port 58116
2019-08-01 02:23:16
103.199.2.200 attackspam
Automatic report - Banned IP Access
2019-08-01 02:16:15
193.70.36.161 attackbots
Invalid user melusi from 193.70.36.161 port 59530
2019-08-01 02:28:15
111.125.66.234 attackbots
Invalid user user from 111.125.66.234 port 53104
2019-08-01 02:46:06
122.114.253.197 attackbotsspam
Tried sshing with brute force.
2019-08-01 02:12:57
213.32.69.98 attackbots
2019-07-31T12:56:43.053052abusebot-6.cloudsearch.cf sshd\[18050\]: Invalid user apache2 from 213.32.69.98 port 39530
2019-08-01 02:08:19
68.183.24.254 attack
Invalid user pentaho from 68.183.24.254 port 59144
2019-08-01 02:37:47
201.122.33.150 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-31 07:37:55,688 INFO [amun_request_handler] PortScan Detected on Port: 445 (201.122.33.150)
2019-08-01 02:40:28
139.59.84.111 attack
Invalid user leon from 139.59.84.111 port 45930
2019-08-01 02:33:46

Recently Reported IPs

104.21.72.89 104.21.72.84 104.21.72.93 104.21.72.96
104.21.73.100 104.21.73.101 104.21.73.102 104.21.73.105
104.21.73.104 104.21.73.109 104.21.73.106 104.21.73.11
104.21.72.99 104.21.72.97 104.21.73.107 104.21.73.110
104.21.73.114 104.21.73.115 104.21.73.118 104.21.73.117