Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.75.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.75.157.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:19:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 157.75.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.75.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.185.151.202 attackbotsspam
Automatic report - Port Scan Attack
2019-12-17 07:43:42
175.107.198.23 attackbotsspam
Dec 16 13:22:10 php1 sshd\[15104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.107.198.23  user=mysql
Dec 16 13:22:12 php1 sshd\[15104\]: Failed password for mysql from 175.107.198.23 port 49036 ssh2
Dec 16 13:28:41 php1 sshd\[15713\]: Invalid user sahli from 175.107.198.23
Dec 16 13:28:41 php1 sshd\[15713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.107.198.23
Dec 16 13:28:43 php1 sshd\[15713\]: Failed password for invalid user sahli from 175.107.198.23 port 56602 ssh2
2019-12-17 07:42:28
94.23.24.213 attackbotsspam
Dec 16 23:24:49 srv01 sshd[25983]: Invalid user admin from 94.23.24.213 port 45008
Dec 16 23:24:49 srv01 sshd[25983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.24.213
Dec 16 23:24:49 srv01 sshd[25983]: Invalid user admin from 94.23.24.213 port 45008
Dec 16 23:24:51 srv01 sshd[25983]: Failed password for invalid user admin from 94.23.24.213 port 45008 ssh2
Dec 16 23:29:56 srv01 sshd[26374]: Invalid user alsobrook from 94.23.24.213 port 52362
...
2019-12-17 07:47:27
191.96.145.155 attackbots
SMB Server BruteForce Attack
2019-12-17 07:48:25
40.92.3.46 attackspam
Dec 17 00:57:25 debian-2gb-vpn-nbg1-1 kernel: [911814.299490] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.3.46 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=104 ID=26425 DF PROTO=TCP SPT=11974 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-17 07:37:53
62.219.3.58 attackspam
Dec 17 02:10:33 debian-2gb-vpn-nbg1-1 sshd[31963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.219.3.58
2019-12-17 07:38:50
118.89.236.107 attack
SSH Brute Force, server-1 sshd[25002]: Failed password for invalid user guitar from 118.89.236.107 port 57090 ssh2
2019-12-17 08:03:51
125.64.94.211 attackbotsspam
slow and persistent scanner
2019-12-17 07:47:06
89.97.218.140 attackbots
Brute forcing RDP port 3389
2019-12-17 07:54:38
54.37.196.144 attackspambots
Dec 16 22:57:50 debian-2gb-nbg1-2 kernel: \[186253.329881\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=54.37.196.144 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=32830 PROTO=TCP SPT=53465 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-17 08:04:16
103.138.41.74 attackbotsspam
Dec 16 13:51:11 auw2 sshd\[3529\]: Invalid user flesvig from 103.138.41.74
Dec 16 13:51:11 auw2 sshd\[3529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.41.74
Dec 16 13:51:13 auw2 sshd\[3529\]: Failed password for invalid user flesvig from 103.138.41.74 port 52170 ssh2
Dec 16 13:57:42 auw2 sshd\[4371\]: Invalid user morfeu from 103.138.41.74
Dec 16 13:57:42 auw2 sshd\[4371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.41.74
2019-12-17 08:09:25
45.95.33.121 attackspam
Autoban   45.95.33.121 AUTH/CONNECT
2019-12-17 07:56:42
88.158.92.115 proxy
678uiop
2019-12-17 08:01:09
103.138.109.76 attackbotsspam
Dec 17 02:25:59 server sshd\[3578\]: Invalid user support from 103.138.109.76
Dec 17 02:25:59 server sshd\[3578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.109.76 
Dec 17 02:26:01 server sshd\[3578\]: Failed password for invalid user support from 103.138.109.76 port 59929 ssh2
Dec 17 02:28:07 server sshd\[3967\]: Invalid user support from 103.138.109.76
Dec 17 02:28:07 server sshd\[3967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.109.76 
...
2019-12-17 07:52:26
218.92.0.190 attack
Dec 17 01:02:19 dcd-gentoo sshd[13959]: User root from 218.92.0.190 not allowed because none of user's groups are listed in AllowGroups
Dec 17 01:02:21 dcd-gentoo sshd[13959]: error: PAM: Authentication failure for illegal user root from 218.92.0.190
Dec 17 01:02:19 dcd-gentoo sshd[13959]: User root from 218.92.0.190 not allowed because none of user's groups are listed in AllowGroups
Dec 17 01:02:21 dcd-gentoo sshd[13959]: error: PAM: Authentication failure for illegal user root from 218.92.0.190
Dec 17 01:02:19 dcd-gentoo sshd[13959]: User root from 218.92.0.190 not allowed because none of user's groups are listed in AllowGroups
Dec 17 01:02:21 dcd-gentoo sshd[13959]: error: PAM: Authentication failure for illegal user root from 218.92.0.190
Dec 17 01:02:21 dcd-gentoo sshd[13959]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.190 port 50715 ssh2
...
2019-12-17 08:17:00

Recently Reported IPs

13.225.71.80 104.21.75.189 104.21.75.179 104.21.75.18
104.21.75.202 104.21.75.2 104.21.75.210 104.21.75.226
104.21.75.38 104.21.75.234 104.21.75.53 104.21.75.72
104.21.75.60 104.21.75.66 104.21.75.90 104.21.75.74
13.225.71.81 104.21.76.131 104.21.76.102 104.21.75.98