Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.92.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8778
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.92.119.			IN	A

;; AUTHORITY SECTION:
.			523	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:15:36 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 119.92.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.92.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.245.23.163 attackspambots
Scanning
2019-12-15 20:43:14
63.81.87.89 attackspam
Dec 15 07:24:56  exim[23796]: [1\51] 1igNKm-0006Bo-Dj H=base.vidyad.com (base.alibash.com) [63.81.87.89] F= rejected after DATA: This message scored 101.1 spam points.
2019-12-15 20:32:32
132.232.113.102 attackbotsspam
Dec 15 12:11:29 mail sshd\[23798\]: Invalid user hadzri from 132.232.113.102
Dec 15 12:11:29 mail sshd\[23798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.113.102
Dec 15 12:11:31 mail sshd\[23798\]: Failed password for invalid user hadzri from 132.232.113.102 port 57572 ssh2
...
2019-12-15 20:16:36
130.61.88.249 attack
2019-12-15T13:18:09.298807stark.klein-stark.info sshd\[7895\]: Invalid user member from 130.61.88.249 port 60324
2019-12-15T13:18:09.306268stark.klein-stark.info sshd\[7895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.88.249
2019-12-15T13:18:11.398968stark.klein-stark.info sshd\[7895\]: Failed password for invalid user member from 130.61.88.249 port 60324 ssh2
...
2019-12-15 20:29:02
106.12.208.211 attack
Dec 15 07:25:15 MK-Soft-Root1 sshd[29794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.211 
Dec 15 07:25:18 MK-Soft-Root1 sshd[29794]: Failed password for invalid user guest from 106.12.208.211 port 38538 ssh2
...
2019-12-15 20:13:40
88.84.200.139 attackbotsspam
Dec 15 13:11:08 legacy sshd[28986]: Failed password for root from 88.84.200.139 port 51713 ssh2
Dec 15 13:16:21 legacy sshd[29180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.84.200.139
Dec 15 13:16:23 legacy sshd[29180]: Failed password for invalid user mysql from 88.84.200.139 port 54913 ssh2
...
2019-12-15 20:27:45
156.96.153.116 attackspam
Dec 15 12:46:19 ns3042688 sshd\[12592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.96.153.116  user=root
Dec 15 12:46:21 ns3042688 sshd\[12592\]: Failed password for root from 156.96.153.116 port 45950 ssh2
Dec 15 12:54:41 ns3042688 sshd\[15851\]: Invalid user desourdy from 156.96.153.116
Dec 15 12:54:41 ns3042688 sshd\[15851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.96.153.116 
Dec 15 12:54:43 ns3042688 sshd\[15851\]: Failed password for invalid user desourdy from 156.96.153.116 port 49304 ssh2
...
2019-12-15 20:45:30
149.56.131.73 attackbots
Dec 15 12:57:43 gw1 sshd[7403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.131.73
Dec 15 12:57:45 gw1 sshd[7403]: Failed password for invalid user roseth from 149.56.131.73 port 41100 ssh2
...
2019-12-15 20:14:43
139.59.90.40 attackspambots
Dec 15 08:41:55 sauna sshd[119794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.40
Dec 15 08:41:57 sauna sshd[119794]: Failed password for invalid user swenberg from 139.59.90.40 port 20809 ssh2
...
2019-12-15 20:15:14
117.146.251.138 attackspambots
firewall-block, port(s): 37493/tcp
2019-12-15 20:34:34
128.199.224.215 attack
Dec 14 23:00:46 web1 sshd\[28962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.224.215  user=games
Dec 14 23:00:48 web1 sshd\[28962\]: Failed password for games from 128.199.224.215 port 57014 ssh2
Dec 14 23:07:31 web1 sshd\[29928\]: Invalid user fukuda from 128.199.224.215
Dec 14 23:07:31 web1 sshd\[29928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.224.215
Dec 14 23:07:33 web1 sshd\[29928\]: Failed password for invalid user fukuda from 128.199.224.215 port 34744 ssh2
2019-12-15 20:54:26
78.27.172.65 attackbotsspam
2019-12-15T13:03:53.802287scmdmz1 sshd\[17718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=unnum-78-27-172-65.domashka.kiev.ua  user=root
2019-12-15T13:03:55.754059scmdmz1 sshd\[17718\]: Failed password for root from 78.27.172.65 port 40158 ssh2
2019-12-15T13:09:42.995499scmdmz1 sshd\[18214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=unnum-78-27-172-65.domashka.kiev.ua  user=root
...
2019-12-15 20:20:18
34.92.38.238 attackbots
Dec 14 04:49:03 newdogma sshd[32605]: Invalid user midttun from 34.92.38.238 port 46586
Dec 14 04:49:03 newdogma sshd[32605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.38.238
Dec 14 04:49:06 newdogma sshd[32605]: Failed password for invalid user midttun from 34.92.38.238 port 46586 ssh2
Dec 14 04:49:06 newdogma sshd[32605]: Received disconnect from 34.92.38.238 port 46586:11: Bye Bye [preauth]
Dec 14 04:49:06 newdogma sshd[32605]: Disconnected from 34.92.38.238 port 46586 [preauth]
Dec 14 05:00:42 newdogma sshd[32739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.38.238  user=r.r
Dec 14 05:00:43 newdogma sshd[32739]: Failed password for r.r from 34.92.38.238 port 33338 ssh2
Dec 14 05:00:44 newdogma sshd[32739]: Received disconnect from 34.92.38.238 port 33338:11: Bye Bye [preauth]
Dec 14 05:00:44 newdogma sshd[32739]: Disconnected from 34.92.38.238 port 33338 [preauth]
D........
-------------------------------
2019-12-15 20:33:11
117.50.11.192 attack
firewall-block, port(s): 175/tcp
2019-12-15 20:38:36
190.130.60.148 attack
Unauthorized connection attempt detected from IP address 190.130.60.148 to port 23
2019-12-15 20:41:08

Recently Reported IPs

104.21.92.121 104.21.92.116 104.21.92.122 104.21.92.120
104.21.92.125 104.21.92.124 104.21.92.126 104.21.92.123
104.21.92.127 104.21.92.129 104.21.92.130 104.21.92.13
104.21.92.133 104.21.92.132 104.21.92.128 104.21.92.135
104.21.92.136 104.21.92.138 104.21.92.142 104.21.92.141