Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.75.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.75.156.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:54:03 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 156.75.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 156.75.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.204.254.4 attackspam
Sep  5 21:10:44 hanapaa sshd\[32575\]: Invalid user oracle from 129.204.254.4
Sep  5 21:10:44 hanapaa sshd\[32575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.254.4
Sep  5 21:10:45 hanapaa sshd\[32575\]: Failed password for invalid user oracle from 129.204.254.4 port 50564 ssh2
Sep  5 21:16:10 hanapaa sshd\[556\]: Invalid user node from 129.204.254.4
Sep  5 21:16:10 hanapaa sshd\[556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.254.4
2019-09-06 15:18:35
83.221.180.122 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 03:47:09,156 INFO [amun_request_handler] PortScan Detected on Port: 445 (83.221.180.122)
2019-09-06 15:31:41
104.248.185.25 attackbots
*Port Scan* detected from 104.248.185.25 (US/United States/-). 4 hits in the last 220 seconds
2019-09-06 15:36:00
112.64.33.38 attackbots
Sep  6 03:21:57 ny01 sshd[10198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.33.38
Sep  6 03:21:59 ny01 sshd[10198]: Failed password for invalid user deploy from 112.64.33.38 port 50529 ssh2
Sep  6 03:27:59 ny01 sshd[11630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.33.38
2019-09-06 15:36:21
196.216.206.2 attackbots
2019-09-06T05:02:00.621997abusebot-7.cloudsearch.cf sshd\[12670\]: Invalid user 123 from 196.216.206.2 port 60940
2019-09-06 15:42:54
37.49.230.10 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-09-06 15:32:58
91.220.235.51 attackspam
19/9/5@23:55:22: FAIL: IoT-Telnet address from=91.220.235.51
...
2019-09-06 15:25:07
51.38.48.127 attack
Jan 21 21:04:01 vtv3 sshd\[29576\]: Invalid user impala from 51.38.48.127 port 41876
Jan 21 21:04:01 vtv3 sshd\[29576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.48.127
Jan 21 21:04:03 vtv3 sshd\[29576\]: Failed password for invalid user impala from 51.38.48.127 port 41876 ssh2
Jan 21 21:07:40 vtv3 sshd\[30747\]: Invalid user stan from 51.38.48.127 port 41772
Jan 21 21:07:40 vtv3 sshd\[30747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.48.127
Jan 25 04:12:25 vtv3 sshd\[11114\]: Invalid user ode from 51.38.48.127 port 55876
Jan 25 04:12:25 vtv3 sshd\[11114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.48.127
Jan 25 04:12:27 vtv3 sshd\[11114\]: Failed password for invalid user ode from 51.38.48.127 port 55876 ssh2
Jan 25 04:16:19 vtv3 sshd\[12298\]: Invalid user sn from 51.38.48.127 port 58032
Jan 25 04:16:19 vtv3 sshd\[12298\]: pam_unix\(sshd:auth\
2019-09-06 15:28:28
221.194.137.28 attackbotsspam
2019-09-06T13:26:50.831300enmeeting.mahidol.ac.th sshd\[4131\]: Invalid user username from 221.194.137.28 port 32816
2019-09-06T13:26:50.845652enmeeting.mahidol.ac.th sshd\[4131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.194.137.28
2019-09-06T13:26:52.638380enmeeting.mahidol.ac.th sshd\[4131\]: Failed password for invalid user username from 221.194.137.28 port 32816 ssh2
...
2019-09-06 15:45:57
218.92.0.138 attackspambots
Sep  5 20:50:30 web1 sshd\[4969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Sep  5 20:50:32 web1 sshd\[4969\]: Failed password for root from 218.92.0.138 port 19993 ssh2
Sep  5 20:50:34 web1 sshd\[4969\]: Failed password for root from 218.92.0.138 port 19993 ssh2
Sep  5 20:50:37 web1 sshd\[4969\]: Failed password for root from 218.92.0.138 port 19993 ssh2
Sep  5 20:50:50 web1 sshd\[4996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
2019-09-06 15:23:01
112.231.255.63 attackbots
" "
2019-09-06 15:51:48
179.191.215.165 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 03:47:27,186 INFO [amun_request_handler] PortScan Detected on Port: 445 (179.191.215.165)
2019-09-06 15:28:47
42.188.200.125 attackspambots
[Aegis] @ 2019-09-06 04:55:16  0100 -> Attempt to use mail server as relay (550: Requested action not taken).
2019-09-06 15:26:04
106.12.24.234 attackbotsspam
Sep  5 21:18:10 hpm sshd\[993\]: Invalid user ftp1 from 106.12.24.234
Sep  5 21:18:10 hpm sshd\[993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.234
Sep  5 21:18:13 hpm sshd\[993\]: Failed password for invalid user ftp1 from 106.12.24.234 port 39234 ssh2
Sep  5 21:23:42 hpm sshd\[1435\]: Invalid user nagios from 106.12.24.234
Sep  5 21:23:42 hpm sshd\[1435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.234
2019-09-06 15:24:17
201.238.201.34 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 03:48:25,027 INFO [amun_request_handler] PortScan Detected on Port: 445 (201.238.201.34)
2019-09-06 15:17:43

Recently Reported IPs

104.21.75.151 104.21.75.160 104.21.75.154 104.21.75.164
104.21.75.168 104.21.75.165 104.21.75.166 104.21.75.169
104.21.75.161 104.21.75.167 104.21.75.159 104.21.75.17
104.21.75.170 104.21.75.171 104.21.75.172 104.21.75.174
104.21.75.173 104.21.75.175 104.21.75.176 104.21.75.177