Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.83.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.83.83.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:05:27 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 83.83.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 83.83.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.47.244.208 attackspambots
WordPress wp-login brute force :: 212.47.244.208 0.200 - [07/Jan/2020:18:39:35  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-01-08 04:43:03
222.124.15.210 attackbots
Unauthorized connection attempt from IP address 222.124.15.210 on Port 445(SMB)
2020-01-08 04:35:10
218.22.36.135 attackspambots
Jan  7 21:33:26 ns381471 sshd[9060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.22.36.135
Jan  7 21:33:27 ns381471 sshd[9060]: Failed password for invalid user ubnt from 218.22.36.135 port 4182 ssh2
2020-01-08 04:50:12
183.166.137.47 attackbots
2020-01-07 06:54:16 dovecot_login authenticator failed for (aejex) [183.166.137.47]:55193 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangming@lerctr.org)
2020-01-07 06:54:23 dovecot_login authenticator failed for (tjyph) [183.166.137.47]:55193 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangming@lerctr.org)
2020-01-07 06:54:35 dovecot_login authenticator failed for (dkwtt) [183.166.137.47]:55193 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangming@lerctr.org)
...
2020-01-08 04:45:18
85.38.164.51 attackbotsspam
Unauthorized connection attempt detected from IP address 85.38.164.51 to port 2220 [J]
2020-01-08 04:56:59
68.183.160.156 attackspam
Jan  7 17:58:48 haigwepa sshd[22849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.156 
Jan  7 17:58:50 haigwepa sshd[22849]: Failed password for invalid user admin from 68.183.160.156 port 7434 ssh2
...
2020-01-08 04:26:16
222.186.15.158 attackbots
Unauthorized connection attempt detected from IP address 222.186.15.158 to port 22 [J]
2020-01-08 04:28:52
50.53.179.3 attack
2020-01-07T20:16:52.250701  sshd[22393]: Invalid user obg from 50.53.179.3 port 37046
2020-01-07T20:16:52.264970  sshd[22393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.53.179.3
2020-01-07T20:16:52.250701  sshd[22393]: Invalid user obg from 50.53.179.3 port 37046
2020-01-07T20:16:54.256696  sshd[22393]: Failed password for invalid user obg from 50.53.179.3 port 37046 ssh2
2020-01-07T20:33:18.468403  sshd[22755]: Invalid user test from 50.53.179.3 port 50238
...
2020-01-08 04:24:15
218.92.0.189 attack
Jan  7 17:06:27 legacy sshd[19892]: Failed password for root from 218.92.0.189 port 44578 ssh2
Jan  7 17:07:40 legacy sshd[19971]: Failed password for root from 218.92.0.189 port 62183 ssh2
Jan  7 17:07:41 legacy sshd[19971]: Failed password for root from 218.92.0.189 port 62183 ssh2
...
2020-01-08 04:31:30
182.61.184.194 attack
Unauthorized connection attempt from IP address 182.61.184.194 on Port 445(SMB)
2020-01-08 04:39:50
124.156.99.13 attack
Unauthorized connection attempt detected from IP address 124.156.99.13 to port 2220 [J]
2020-01-08 04:51:58
81.22.45.117 attackbotsspam
2020-01-07T21:59:19.997360+01:00 lumpi kernel: [3720659.837354] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.117 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=23514 PROTO=TCP SPT=59882 DPT=8119 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-01-08 04:59:54
159.203.90.122 attackspam
Automatic report - XMLRPC Attack
2020-01-08 04:48:15
45.40.194.129 attackspam
SSH Brute Force, server-1 sshd[20296]: Failed password for invalid user user from 45.40.194.129 port 42492 ssh2
2020-01-08 04:22:51
101.91.160.243 attack
Unauthorized connection attempt detected from IP address 101.91.160.243 to port 2220 [J]
2020-01-08 04:36:12

Recently Reported IPs

104.21.83.80 104.21.83.81 104.21.83.82 104.21.83.86
104.21.83.85 104.21.83.89 104.21.83.9 104.21.83.90
104.21.83.84 104.21.83.93 104.21.83.95 104.21.83.94
104.21.83.96 104.21.83.97 104.21.83.98 104.21.84.100
104.21.83.99 104.21.84.102 104.21.84.104 104.21.84.108