Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.83.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.83.53.			IN	A

;; AUTHORITY SECTION:
.			39	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:05:18 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 53.83.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.83.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.188.22.56 attackbots
193.188.22.56 - - \[10/Jul/2019:21:07:24 +0200\] "\\x03" 400 226 "-" "-"
2019-07-11 04:51:24
162.243.134.187 attackspambots
Unauthorized connection attempt from IP address 162.243.134.187 on Port 143(IMAP)
2019-07-11 04:48:32
130.162.74.85 attackbotsspam
Jul 10 21:03:22 mail sshd\[18467\]: Invalid user sahil from 130.162.74.85\
Jul 10 21:03:24 mail sshd\[18467\]: Failed password for invalid user sahil from 130.162.74.85 port 31178 ssh2\
Jul 10 21:04:56 mail sshd\[18472\]: Invalid user apps from 130.162.74.85\
Jul 10 21:04:58 mail sshd\[18472\]: Failed password for invalid user apps from 130.162.74.85 port 39729 ssh2\
Jul 10 21:06:23 mail sshd\[18494\]: Invalid user amolah from 130.162.74.85\
Jul 10 21:06:26 mail sshd\[18494\]: Failed password for invalid user amolah from 130.162.74.85 port 47783 ssh2\
2019-07-11 05:30:09
103.109.178.20 attackspambots
Jul 10 20:58:45 rigel postfix/smtpd[11246]: connect from unknown[103.109.178.20]
Jul 10 20:58:47 rigel postfix/smtpd[11246]: warning: unknown[103.109.178.20]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 10 20:58:48 rigel postfix/smtpd[11246]: warning: unknown[103.109.178.20]: SASL PLAIN authentication failed: authentication failure
Jul 10 20:58:48 rigel postfix/smtpd[11246]: warning: unknown[103.109.178.20]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.109.178.20
2019-07-11 05:25:06
78.212.178.81 attack
(sshd) Failed SSH login from 78.212.178.81 (moh51-1-78-212-178-81.fbx.proxad.net): 5 in the last 3600 secs
2019-07-11 05:17:22
107.170.198.109 attack
imap or smtp brute force
2019-07-11 05:06:45
142.11.222.183 attack
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-10 21:04:45]
2019-07-11 05:36:48
123.201.20.30 attackspam
(sshd) Failed SSH login from 123.201.20.30 (30-20-201-123.static.youbroadband.in): 5 in the last 3600 secs
2019-07-11 05:37:11
47.34.107.68 attackspam
Jul 10 23:03:44 [munged] sshd[7003]: Invalid user pi from 47.34.107.68 port 36074
Jul 10 23:03:44 [munged] sshd[7005]: Invalid user pi from 47.34.107.68 port 36078
2019-07-11 05:19:15
132.255.253.27 attack
Jul 10 20:58:12 own sshd[28899]: Invalid user pr from 132.255.253.27
Jul 10 20:58:12 own sshd[28899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.253.27
Jul 10 20:58:13 own sshd[28899]: Failed password for invalid user pr from 132.255.253.27 port 53136 ssh2
Jul 10 20:58:14 own sshd[28899]: Received disconnect from 132.255.253.27 port 53136:11: Bye Bye [preauth]
Jul 10 20:58:14 own sshd[28899]: Disconnected from 132.255.253.27 port 53136 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=132.255.253.27
2019-07-11 05:32:50
179.49.2.67 attack
" "
2019-07-11 05:13:01
103.109.53.3 attack
Jul 10 19:17:13 MK-Soft-VM5 sshd\[12370\]: Invalid user agent from 103.109.53.3 port 55538
Jul 10 19:17:13 MK-Soft-VM5 sshd\[12370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.109.53.3
Jul 10 19:17:14 MK-Soft-VM5 sshd\[12370\]: Failed password for invalid user agent from 103.109.53.3 port 55538 ssh2
...
2019-07-11 05:04:02
115.90.219.20 attackspambots
Jul 10 20:26:09 XXX sshd[2985]: Invalid user nb from 115.90.219.20 port 53708
2019-07-11 05:15:56
218.155.31.247 attackbots
Automatic report - Web App Attack
2019-07-11 05:10:27
130.255.138.189 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-10 21:04:49]
2019-07-11 05:35:28

Recently Reported IPs

104.21.83.46 104.21.83.54 104.21.83.56 104.21.83.55
104.21.83.57 104.21.83.6 104.21.83.60 104.21.83.61
104.21.83.59 104.21.83.63 104.21.83.62 104.21.83.64
104.21.83.66 104.21.83.65 104.21.83.69 104.21.83.7
104.21.83.75 104.21.83.74 104.21.83.77 104.21.83.71