Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.73.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46890
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.73.145.			IN	A

;; AUTHORITY SECTION:
.			283	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:36:57 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 145.73.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.73.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.38.150.153 attackbots
2020-06-14 00:41:31 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=mel@lavrinenko.info)
2020-06-14 00:42:54 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=jeroen@lavrinenko.info)
...
2020-06-14 05:44:13
2a03:b0c0:3:e0::233:7001 attack
162.158.88.224 2a03:b0c0:3:e0::233:7001 - [13/Jun/2020:21:04:15 +0000] "POST /wp-login.php HTTP/1.1" 302 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 0 PHP/7.3.17 338769
162.158.88.38 2a03:b0c0:3:e0::233:7001 - [13/Jun/2020:21:04:16 +0000] "POST /wp-login.php HTTP/1.1" 200 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 1933 PHP/7.3.17 348539
162.158.94.158 2a03:b0c0:3:e0::233:7001 - [13/Jun/2020:21:04:16 +0000] "POST /wp-login.php HTTP/1.1" 302 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 0 PHP/7.3.17 324702
2020-06-14 05:25:24
218.92.0.212 attack
Jun 13 21:15:47 django-0 sshd\[4185\]: Failed password for root from 218.92.0.212 port 56428 ssh2Jun 13 21:16:06 django-0 sshd\[4189\]: Failed password for root from 218.92.0.212 port 20861 ssh2Jun 13 21:16:29 django-0 sshd\[4201\]: Failed password for root from 218.92.0.212 port 49712 ssh2
...
2020-06-14 05:15:06
178.126.53.168 attackspambots
12-6-2020 15:38:40	Unauthorized connection attempt (Brute-Force).
12-6-2020 15:38:40	Connection from IP address: 178.126.53.168 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.126.53.168
2020-06-14 05:39:04
118.187.8.34 attack
2020-06-13T21:10:54.535812shield sshd\[22015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.187.8.34  user=root
2020-06-13T21:10:56.485673shield sshd\[22015\]: Failed password for root from 118.187.8.34 port 40372 ssh2
2020-06-13T21:15:08.145663shield sshd\[23805\]: Invalid user testuser from 118.187.8.34 port 48752
2020-06-13T21:15:08.150816shield sshd\[23805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.187.8.34
2020-06-13T21:15:09.968651shield sshd\[23805\]: Failed password for invalid user testuser from 118.187.8.34 port 48752 ssh2
2020-06-14 05:24:02
170.210.121.208 attack
$f2bV_matches
2020-06-14 05:42:17
192.35.168.242 attackspambots
Tried our host z.
2020-06-14 05:26:48
179.107.7.49 attackspambots
Automatic report - Banned IP Access
2020-06-14 05:19:27
5.188.87.57 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-13T17:50:19Z and 2020-06-13T18:10:18Z
2020-06-14 05:10:22
114.67.110.240 attack
Jun 13 23:06:21 localhost sshd\[19295\]: Invalid user test2 from 114.67.110.240
Jun 13 23:06:21 localhost sshd\[19295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.110.240
Jun 13 23:06:23 localhost sshd\[19295\]: Failed password for invalid user test2 from 114.67.110.240 port 31857 ssh2
Jun 13 23:09:44 localhost sshd\[19468\]: Invalid user operator from 114.67.110.240
Jun 13 23:09:44 localhost sshd\[19468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.110.240
...
2020-06-14 05:16:42
165.227.203.162 attackspambots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-06-14 05:09:09
101.255.81.91 attackbotsspam
Jun 13 22:29:02 santamaria sshd\[14860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.81.91  user=root
Jun 13 22:29:04 santamaria sshd\[14860\]: Failed password for root from 101.255.81.91 port 38020 ssh2
Jun 13 22:31:25 santamaria sshd\[14873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.81.91  user=root
...
2020-06-14 05:12:35
222.186.42.137 attackbots
Jun 14 02:25:14 gw1 sshd[18867]: Failed password for root from 222.186.42.137 port 60233 ssh2
...
2020-06-14 05:26:33
124.127.206.4 attackspam
2020-06-13T21:09:14.617143server.espacesoutien.com sshd[23474]: Invalid user sinalco from 124.127.206.4 port 39803
2020-06-13T21:09:14.633613server.espacesoutien.com sshd[23474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.127.206.4
2020-06-13T21:09:14.617143server.espacesoutien.com sshd[23474]: Invalid user sinalco from 124.127.206.4 port 39803
2020-06-13T21:09:16.853136server.espacesoutien.com sshd[23474]: Failed password for invalid user sinalco from 124.127.206.4 port 39803 ssh2
...
2020-06-14 05:39:28
217.182.77.186 attackspambots
Jun 13 23:09:39 [host] sshd[28277]: Invalid user j
Jun 13 23:09:39 [host] sshd[28277]: pam_unix(sshd:
Jun 13 23:09:41 [host] sshd[28277]: Failed passwor
2020-06-14 05:18:17

Recently Reported IPs

122.148.146.109 104.21.73.111 104.21.73.108 104.21.73.123
104.21.73.162 104.21.73.18 104.21.73.175 60.21.0.123
104.21.73.193 104.18.8.220 104.21.73.199 104.21.73.195
104.21.73.179 104.21.73.23 104.21.73.170 104.21.73.224
104.21.73.25 104.21.73.249 104.21.73.22 104.21.73.253