Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.90.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.90.133.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:13:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 133.90.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.90.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.162.136 attackbotsspam
Feb 13 06:37:19 debian-2gb-nbg1-2 kernel: \[3831468.231299\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.162.136 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=60082 PROTO=TCP SPT=46193 DPT=2626 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-13 14:10:58
2.230.149.202 attackbotsspam
02/13/2020-05:54:04.019175 2.230.149.202 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 7
2020-02-13 14:19:55
201.159.184.142 attackspambots
Automatic report - Port Scan Attack
2020-02-13 14:23:40
114.33.100.30 attack
DATE:2020-02-13 05:52:29, IP:114.33.100.30, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-13 14:25:45
125.123.129.234 attackbotsspam
1581569612 - 02/13/2020 05:53:32 Host: 125.123.129.234/125.123.129.234 Port: 445 TCP Blocked
2020-02-13 14:40:46
59.88.202.200 attackbotsspam
Feb 12 20:12:51 hpm sshd\[5771\]: Invalid user redhat from 59.88.202.200
Feb 12 20:12:51 hpm sshd\[5771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.88.202.200
Feb 12 20:12:53 hpm sshd\[5771\]: Failed password for invalid user redhat from 59.88.202.200 port 57612 ssh2
Feb 12 20:18:31 hpm sshd\[6375\]: Invalid user elastic from 59.88.202.200
Feb 12 20:18:31 hpm sshd\[6375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.88.202.200
2020-02-13 14:37:53
222.252.20.68 attackbots
(sshd) Failed SSH login from 222.252.20.68 (VN/Vietnam/static.vnpt-hanoi.com.vn): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 13 05:53:16 ubnt-55d23 sshd[2206]: Invalid user test from 222.252.20.68 port 51241
Feb 13 05:53:19 ubnt-55d23 sshd[2206]: Failed password for invalid user test from 222.252.20.68 port 51241 ssh2
2020-02-13 14:54:08
193.34.93.243 attackbots
Feb 13 04:54:11 thevastnessof sshd[813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.34.93.243
...
2020-02-13 14:13:23
103.206.137.90 attack
20/2/12@23:54:18: FAIL: Alarm-Network address from=103.206.137.90
20/2/12@23:54:19: FAIL: Alarm-Network address from=103.206.137.90
...
2020-02-13 14:09:05
149.5.209.159 attack
149.5.209.159 - - \[13/Feb/2020:05:53:48 +0100\] "POST /wp-login.php HTTP/1.0" 200 3080 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.5.209.159 - - \[13/Feb/2020:05:53:50 +0100\] "POST /wp-login.php HTTP/1.0" 200 3078 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.5.209.159 - - \[13/Feb/2020:05:53:51 +0100\] "POST /wp-login.php HTTP/1.0" 200 3050 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-02-13 14:28:43
84.201.157.119 attack
Invalid user secret from 84.201.157.119 port 41940
2020-02-13 14:24:56
222.186.31.166 attack
Feb 13 07:17:46 dcd-gentoo sshd[7010]: User root from 222.186.31.166 not allowed because none of user's groups are listed in AllowGroups
Feb 13 07:17:50 dcd-gentoo sshd[7010]: error: PAM: Authentication failure for illegal user root from 222.186.31.166
Feb 13 07:17:46 dcd-gentoo sshd[7010]: User root from 222.186.31.166 not allowed because none of user's groups are listed in AllowGroups
Feb 13 07:17:50 dcd-gentoo sshd[7010]: error: PAM: Authentication failure for illegal user root from 222.186.31.166
Feb 13 07:17:46 dcd-gentoo sshd[7010]: User root from 222.186.31.166 not allowed because none of user's groups are listed in AllowGroups
Feb 13 07:17:50 dcd-gentoo sshd[7010]: error: PAM: Authentication failure for illegal user root from 222.186.31.166
Feb 13 07:17:50 dcd-gentoo sshd[7010]: Failed keyboard-interactive/pam for invalid user root from 222.186.31.166 port 16746 ssh2
...
2020-02-13 14:23:04
111.67.193.204 attack
Feb 12 20:01:42 sachi sshd\[10650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.193.204  user=root
Feb 12 20:01:45 sachi sshd\[10650\]: Failed password for root from 111.67.193.204 port 52356 ssh2
Feb 12 20:05:58 sachi sshd\[11161\]: Invalid user sampless from 111.67.193.204
Feb 12 20:05:58 sachi sshd\[11161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.193.204
Feb 12 20:06:00 sachi sshd\[11161\]: Failed password for invalid user sampless from 111.67.193.204 port 43408 ssh2
2020-02-13 14:12:20
195.176.3.20 attackspambots
2,14-01/02 [bc01/m18] PostRequest-Spammer scoring: lisboa
2020-02-13 14:55:03
36.89.135.79 attack
Feb 13 00:22:41 server sshd\[5722\]: Failed password for invalid user admin from 36.89.135.79 port 18952 ssh2
Feb 13 06:50:37 server sshd\[14878\]: Invalid user oracle from 36.89.135.79
Feb 13 06:50:37 server sshd\[14878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.135.79 
Feb 13 06:50:40 server sshd\[14878\]: Failed password for invalid user oracle from 36.89.135.79 port 18952 ssh2
Feb 13 07:53:55 server sshd\[24783\]: Invalid user write from 36.89.135.79
Feb 13 07:53:55 server sshd\[24783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.135.79 
...
2020-02-13 14:26:40

Recently Reported IPs

104.21.90.131 104.21.90.135 104.21.90.138 104.21.90.137
104.21.90.134 104.21.90.139 104.21.90.140 104.21.90.14
104.21.90.141 104.21.90.143 104.21.90.142 104.21.90.145
104.21.90.147 104.21.90.144 104.21.90.148 104.21.90.15
104.21.90.150 104.21.90.151 104.21.90.153 104.21.90.146