Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.79.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59137
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.79.154.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:58:29 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 154.79.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.79.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
142.93.212.168 attack
$f2bV_matches
2019-12-02 06:38:44
190.25.232.2 attackbotsspam
fail2ban
2019-12-02 06:35:59
14.126.15.164 attack
Telnet/23 MH Probe, BF, Hack -
2019-12-02 06:24:02
82.118.242.108 attackbotsspam
DATE:2019-12-01 15:32:55, IP:82.118.242.108, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-12-02 06:48:00
80.47.50.111 attackspam
port scan/probe/communication attempt; port 23
2019-12-02 07:00:38
185.67.160.8 attackbotsspam
[portscan] Port scan
2019-12-02 06:55:28
190.129.173.157 attack
$f2bV_matches
2019-12-02 06:18:20
190.190.40.203 attackspambots
fail2ban
2019-12-02 06:38:15
183.150.139.62 attackbots
WordPress brute force
2019-12-02 06:24:27
150.109.106.224 attack
Dec  2 05:35:55 webhost01 sshd[22167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.106.224
Dec  2 05:35:57 webhost01 sshd[22167]: Failed password for invalid user koelbl from 150.109.106.224 port 44508 ssh2
...
2019-12-02 06:42:21
218.94.133.182 attackspambots
Dec  1 09:33:02 host sshd\[18358\]: Invalid user postgres from 218.94.133.182Dec  1 09:33:07 host sshd\[18397\]: Invalid user postgres from 218.94.133.182Dec  1 09:33:07 host sshd\[18425\]: Invalid user postgres from 218.94.133.182
...
2019-12-02 06:41:57
123.207.142.31 attack
SSH bruteforce
2019-12-02 06:27:48
212.68.208.120 attack
Dec  1 22:16:35 srv206 sshd[9922]: Invalid user a4 from 212.68.208.120
Dec  1 22:16:35 srv206 sshd[9922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-212-68-208-120.dynamic.voo.be
Dec  1 22:16:35 srv206 sshd[9922]: Invalid user a4 from 212.68.208.120
Dec  1 22:16:37 srv206 sshd[9922]: Failed password for invalid user a4 from 212.68.208.120 port 50084 ssh2
...
2019-12-02 06:43:09
188.131.223.181 attackspam
2019-12-01T20:31:24.703355abusebot-4.cloudsearch.cf sshd\[8134\]: Invalid user user from 188.131.223.181 port 55816
2019-12-02 06:26:51
207.154.247.249 attackspam
[munged]::443 207.154.247.249 - - [01/Dec/2019:20:33:42 +0100] "POST /[munged]: HTTP/1.1" 200 6314 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-02 06:44:31

Recently Reported IPs

104.21.79.153 104.21.79.159 104.21.79.157 104.21.79.16
104.21.79.155 104.21.79.160 104.21.79.164 104.21.79.162
104.21.79.163 104.21.79.165 104.21.79.166 104.21.79.161
104.21.79.169 104.21.79.17 104.21.79.171 104.21.79.172
104.21.79.174 104.21.79.173 104.21.79.180 104.21.79.181