Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.83.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.83.8.			IN	A

;; AUTHORITY SECTION:
.			333	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:05:25 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 8.83.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.83.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.247.194.43 attack
Aug  9 23:32:11 vps639187 sshd\[6020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.194.43  user=root
Aug  9 23:32:13 vps639187 sshd\[6020\]: Failed password for root from 223.247.194.43 port 54636 ssh2
Aug  9 23:35:28 vps639187 sshd\[6063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.194.43  user=root
...
2020-08-10 06:24:51
188.165.230.118 attack
188.165.230.118 - - [09/Aug/2020:23:03:45 +0100] "POST /wp-login.php HTTP/1.1" 200 5927 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
188.165.230.118 - - [09/Aug/2020:23:07:43 +0100] "POST /wp-login.php HTTP/1.1" 200 5920 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
188.165.230.118 - - [09/Aug/2020:23:09:08 +0100] "POST /wp-login.php HTTP/1.1" 200 5920 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-10 06:20:22
218.92.0.208 attackspambots
Aug 10 00:04:21 eventyay sshd[19668]: Failed password for root from 218.92.0.208 port 10055 ssh2
Aug 10 00:04:23 eventyay sshd[19672]: Failed password for root from 218.92.0.208 port 11125 ssh2
Aug 10 00:04:24 eventyay sshd[19668]: Failed password for root from 218.92.0.208 port 10055 ssh2
...
2020-08-10 06:13:31
112.85.42.195 attackspam
Aug  9 21:58:03 onepixel sshd[1266661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
Aug  9 21:58:05 onepixel sshd[1266661]: Failed password for root from 112.85.42.195 port 57007 ssh2
Aug  9 21:58:03 onepixel sshd[1266661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
Aug  9 21:58:05 onepixel sshd[1266661]: Failed password for root from 112.85.42.195 port 57007 ssh2
Aug  9 21:58:08 onepixel sshd[1266661]: Failed password for root from 112.85.42.195 port 57007 ssh2
2020-08-10 06:04:58
207.154.229.50 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-08-10 06:28:56
36.232.178.161 attackspambots
Automatic report - Port Scan Attack
2020-08-10 06:27:51
103.48.192.48 attackspam
2020-08-09T23:26[Censored Hostname] sshd[12787]: Failed password for root from 103.48.192.48 port 22161 ssh2
2020-08-09T23:30[Censored Hostname] sshd[14751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.192.48  user=root
2020-08-09T23:30[Censored Hostname] sshd[14751]: Failed password for root from 103.48.192.48 port 53299 ssh2[...]
2020-08-10 06:12:31
103.3.46.92 attackspambots
Automatic report - Banned IP Access
2020-08-10 06:07:35
51.210.111.223 attackbotsspam
Aug 10 00:16:55 abendstille sshd\[32033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.111.223  user=root
Aug 10 00:16:57 abendstille sshd\[32033\]: Failed password for root from 51.210.111.223 port 38758 ssh2
Aug 10 00:20:58 abendstille sshd\[3850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.111.223  user=root
Aug 10 00:20:59 abendstille sshd\[3850\]: Failed password for root from 51.210.111.223 port 49860 ssh2
Aug 10 00:25:29 abendstille sshd\[8027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.111.223  user=root
...
2020-08-10 06:34:23
190.152.215.77 attack
Aug  9 23:35:07 PorscheCustomer sshd[7597]: Failed password for root from 190.152.215.77 port 50852 ssh2
Aug  9 23:39:03 PorscheCustomer sshd[7746]: Failed password for root from 190.152.215.77 port 55738 ssh2
...
2020-08-10 06:14:23
66.79.188.23 attackbotsspam
(sshd) Failed SSH login from 66.79.188.23 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 10 00:14:31 amsweb01 sshd[9848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.79.188.23  user=root
Aug 10 00:14:33 amsweb01 sshd[9848]: Failed password for root from 66.79.188.23 port 55230 ssh2
Aug 10 00:18:06 amsweb01 sshd[10371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.79.188.23  user=root
Aug 10 00:18:07 amsweb01 sshd[10371]: Failed password for root from 66.79.188.23 port 56814 ssh2
Aug 10 00:21:00 amsweb01 sshd[10743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.79.188.23  user=root
2020-08-10 06:23:00
68.116.41.6 attackspam
Aug  9 23:26:13 server sshd[55036]: Failed password for root from 68.116.41.6 port 44638 ssh2
Aug  9 23:30:38 server sshd[56378]: Failed password for root from 68.116.41.6 port 53392 ssh2
Aug  9 23:35:08 server sshd[57974]: Failed password for root from 68.116.41.6 port 33912 ssh2
2020-08-10 06:37:05
51.137.89.155 attack
Aug  9 23:36:32 mout sshd[10293]: Invalid user wocaonima123.. from 51.137.89.155 port 56066
2020-08-10 06:02:37
177.54.85.10 attackbotsspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-08-10 06:17:29
165.22.40.128 attackbotsspam
165.22.40.128 - - [09/Aug/2020:22:17:17 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.40.128 - - [09/Aug/2020:22:17:18 +0100] "POST /wp-login.php HTTP/1.1" 200 1860 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.40.128 - - [09/Aug/2020:22:17:18 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-10 06:16:10

Recently Reported IPs

104.21.83.79 104.21.83.68 104.21.83.80 104.21.83.83
104.21.83.81 104.21.83.82 104.21.83.86 104.21.83.85
104.21.83.89 104.21.83.9 104.21.83.90 104.21.83.84
104.21.83.93 104.21.83.95 104.21.83.94 104.21.83.96
104.21.83.97 104.21.83.98 104.21.84.100 104.21.83.99