Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.92.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43609
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.92.68.			IN	A

;; AUTHORITY SECTION:
.			167	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:58:38 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 68.92.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.92.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.51.74.189 attackspam
Dec 17 14:45:49 localhost sshd\[70470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189  user=bin
Dec 17 14:45:52 localhost sshd\[70470\]: Failed password for bin from 202.51.74.189 port 50432 ssh2
Dec 17 14:54:33 localhost sshd\[70798\]: Invalid user yumin from 202.51.74.189 port 51088
Dec 17 14:54:33 localhost sshd\[70798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
Dec 17 14:54:35 localhost sshd\[70798\]: Failed password for invalid user yumin from 202.51.74.189 port 51088 ssh2
...
2019-12-17 23:00:47
112.85.42.174 attack
SSH Brute-Force reported by Fail2Ban
2019-12-17 23:13:52
182.203.79.25 attackspambots
" "
2019-12-17 23:22:11
42.114.151.195 attackspam
Unauthorized connection attempt detected from IP address 42.114.151.195 to port 445
2019-12-17 23:06:24
145.255.239.178 attackspam
[portscan] Port scan
2019-12-17 22:58:50
177.154.32.137 attack
port scan and connect, tcp 23 (telnet)
2019-12-17 22:46:42
128.199.143.89 attack
$f2bV_matches
2019-12-17 23:12:26
178.128.97.169 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-12-17 23:15:10
138.197.164.88 attackspambots
Dec 17 10:08:57 plusreed sshd[28323]: Invalid user admin from 138.197.164.88
...
2019-12-17 23:25:38
157.230.31.236 attackbotsspam
Dec 17 05:12:10 web9 sshd\[1280\]: Invalid user server from 157.230.31.236
Dec 17 05:12:10 web9 sshd\[1280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.31.236
Dec 17 05:12:12 web9 sshd\[1280\]: Failed password for invalid user server from 157.230.31.236 port 46742 ssh2
Dec 17 05:17:48 web9 sshd\[2349\]: Invalid user rounder from 157.230.31.236
Dec 17 05:17:48 web9 sshd\[2349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.31.236
2019-12-17 23:20:01
149.56.16.168 attackbots
Dec 17 15:43:30 ns381471 sshd[28793]: Failed password for bin from 149.56.16.168 port 34994 ssh2
2019-12-17 22:51:03
182.48.84.6 attackbots
web-1 [ssh_2] SSH Attack
2019-12-17 23:14:43
98.144.141.51 attackspambots
Dec 17 08:21:41 dallas01 sshd[18850]: Failed password for root from 98.144.141.51 port 34570 ssh2
Dec 17 08:27:00 dallas01 sshd[22609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.144.141.51
Dec 17 08:27:01 dallas01 sshd[22609]: Failed password for invalid user ltenti from 98.144.141.51 port 43336 ssh2
2019-12-17 23:16:50
92.118.160.49 attackspambots
ICMP MH Probe, Scan /Distributed -
2019-12-17 23:08:11
14.160.26.57 attack
Unauthorized connection attempt detected from IP address 14.160.26.57 to port 445
2019-12-17 22:46:18

Recently Reported IPs

132.148.47.254 132.148.8.117 132.148.86.70 132.148.68.111
132.148.8.221 132.148.83.155 132.148.87.21 132.148.58.1
132.148.97.235 132.148.97.173 132.148.98.59 132.148.99.168
132.148.89.229 132.148.97.60 132.174.11.14 132.148.89.63
132.174.1.212 132.155.56.22 104.21.92.69 132.170.20.45