Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.82.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38563
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.82.192.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:03:39 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 192.82.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 192.82.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.43.183.205 attackbotsspam
port scan/probe/communication attempt; port 23
2019-11-26 07:37:46
129.213.172.170 attackbotsspam
Nov 25 23:46:08 MK-Soft-VM6 sshd[6325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.172.170 
Nov 25 23:46:10 MK-Soft-VM6 sshd[6325]: Failed password for invalid user bertrando from 129.213.172.170 port 60421 ssh2
...
2019-11-26 07:38:40
124.121.124.226 attackspambots
port scan/probe/communication attempt; port 23
2019-11-26 07:18:15
92.50.249.166 attack
Nov 25 13:19:26 kapalua sshd\[30276\]: Invalid user operator from 92.50.249.166
Nov 25 13:19:26 kapalua sshd\[30276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.166
Nov 25 13:19:28 kapalua sshd\[30276\]: Failed password for invalid user operator from 92.50.249.166 port 34006 ssh2
Nov 25 13:25:45 kapalua sshd\[30819\]: Invalid user torvund from 92.50.249.166
Nov 25 13:25:45 kapalua sshd\[30819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.166
2019-11-26 07:38:14
185.173.35.9 attack
Port scan: Attack repeated for 24 hours
2019-11-26 07:35:55
178.135.60.49 attackbots
Nov 25 23:39:42 sbg01 sshd[29047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.135.60.49
Nov 25 23:39:44 sbg01 sshd[29047]: Failed password for invalid user rhodella from 178.135.60.49 port 26324 ssh2
Nov 25 23:46:33 sbg01 sshd[29062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.135.60.49
2019-11-26 07:24:40
222.186.175.167 attackspam
$f2bV_matches
2019-11-26 07:03:53
111.231.69.18 attack
Nov 25 18:06:21 www6-3 sshd[8883]: Invalid user adminweb from 111.231.69.18 port 47612
Nov 25 18:06:21 www6-3 sshd[8883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.69.18
Nov 25 18:06:23 www6-3 sshd[8883]: Failed password for invalid user adminweb from 111.231.69.18 port 47612 ssh2
Nov 25 18:06:23 www6-3 sshd[8883]: Received disconnect from 111.231.69.18 port 47612:11: Bye Bye [preauth]
Nov 25 18:06:23 www6-3 sshd[8883]: Disconnected from 111.231.69.18 port 47612 [preauth]
Nov 25 18:58:35 www6-3 sshd[11834]: Invalid user wcddl from 111.231.69.18 port 48094
Nov 25 18:58:35 www6-3 sshd[11834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.69.18
Nov 25 18:58:37 www6-3 sshd[11834]: Failed password for invalid user wcddl from 111.231.69.18 port 48094 ssh2
Nov 25 18:58:38 www6-3 sshd[11834]: Received disconnect from 111.231.69.18 port 48094:11: Bye Bye [preauth]
Nov 25 18:58........
-------------------------------
2019-11-26 07:14:27
212.64.7.134 attack
Jun 22 17:39:11 vtv3 sshd[28090]: Invalid user mo from 212.64.7.134 port 54740
Jun 22 17:39:11 vtv3 sshd[28090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.7.134
Jun 22 17:39:13 vtv3 sshd[28090]: Failed password for invalid user mo from 212.64.7.134 port 54740 ssh2
Jun 22 17:40:40 vtv3 sshd[29125]: Invalid user shuai from 212.64.7.134 port 38066
Jun 22 17:40:40 vtv3 sshd[29125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.7.134
Nov 25 21:14:25 vtv3 sshd[26377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.7.134 
Nov 25 21:14:27 vtv3 sshd[26377]: Failed password for invalid user admin from 212.64.7.134 port 52364 ssh2
Nov 25 21:21:35 vtv3 sshd[30104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.7.134 
Nov 25 21:34:28 vtv3 sshd[3479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ru
2019-11-26 07:23:01
68.183.29.124 attackbotsspam
2019-11-25T23:37:58.411619tmaserv sshd\[16921\]: Failed password for root from 68.183.29.124 port 38640 ssh2
2019-11-26T00:42:07.786771tmaserv sshd\[20219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.29.124  user=lp
2019-11-26T00:42:09.494121tmaserv sshd\[20219\]: Failed password for lp from 68.183.29.124 port 38546 ssh2
2019-11-26T00:48:08.064338tmaserv sshd\[20449\]: Invalid user tracz from 68.183.29.124 port 46252
2019-11-26T00:48:08.068440tmaserv sshd\[20449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.29.124
2019-11-26T00:48:10.001530tmaserv sshd\[20449\]: Failed password for invalid user tracz from 68.183.29.124 port 46252 ssh2
...
2019-11-26 07:25:31
121.243.17.152 attackbotsspam
Nov 25 19:46:15 ws19vmsma01 sshd[53637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.243.17.152
Nov 25 19:46:16 ws19vmsma01 sshd[53637]: Failed password for invalid user server from 121.243.17.152 port 37776 ssh2
...
2019-11-26 07:35:22
139.159.27.62 attackbotsspam
Nov 25 23:46:38 vpn01 sshd[18652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.159.27.62
Nov 25 23:46:39 vpn01 sshd[18652]: Failed password for invalid user lust from 139.159.27.62 port 48354 ssh2
...
2019-11-26 07:19:39
125.25.214.135 attackspambots
port scan/probe/communication attempt; port 23
2019-11-26 07:13:57
203.148.53.227 attackbots
Nov 26 00:27:54 lnxweb61 sshd[24765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.148.53.227
2019-11-26 07:39:01
202.105.136.106 attackspambots
Nov 25 23:43:11 sd-53420 sshd\[15506\]: User root from 202.105.136.106 not allowed because none of user's groups are listed in AllowGroups
Nov 25 23:43:11 sd-53420 sshd\[15506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.105.136.106  user=root
Nov 25 23:43:13 sd-53420 sshd\[15506\]: Failed password for invalid user root from 202.105.136.106 port 53314 ssh2
Nov 25 23:47:01 sd-53420 sshd\[16119\]: Invalid user admin from 202.105.136.106
Nov 25 23:47:01 sd-53420 sshd\[16119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.105.136.106
...
2019-11-26 07:01:34

Recently Reported IPs

104.21.82.19 104.21.82.193 104.21.82.196 104.21.82.199
104.21.82.198 104.21.82.197 104.21.82.2 104.21.82.20
104.21.82.201 104.21.82.202 104.21.82.205 104.21.82.203
104.21.82.207 104.21.82.204 104.21.82.215 104.21.82.213
104.21.82.210 104.21.82.208 104.21.82.217 104.21.82.218