Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.93.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.93.150.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:17:03 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 150.93.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.93.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.209.196.49 attackspam
Brute-force general attack.
2020-03-09 18:02:59
81.30.179.48 attackbotsspam
Mar  9 04:12:12 rama sshd[975589]: reveeclipse mapping checking getaddrinfo for 81.30.179.48.static.ufanet.ru [81.30.179.48] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar  9 04:12:12 rama sshd[975589]: Invalid user lilei from 81.30.179.48
Mar  9 04:12:12 rama sshd[975589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.179.48 
Mar  9 04:12:14 rama sshd[975589]: Failed password for invalid user lilei from 81.30.179.48 port 34647 ssh2
Mar  9 04:12:15 rama sshd[975589]: Received disconnect from 81.30.179.48: 11: Bye Bye [preauth]
Mar  9 04:27:28 rama sshd[989174]: reveeclipse mapping checking getaddrinfo for 81.30.179.48.static.ufanet.ru [81.30.179.48] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar  9 04:27:28 rama sshd[989174]: Invalid user jeff from 81.30.179.48
Mar  9 04:27:28 rama sshd[989174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.179.48 
Mar  9 04:27:30 rama sshd[989174]: Failed........
-------------------------------
2020-03-09 18:05:21
106.12.176.53 attackbotsspam
Mar  9 06:03:20 ourumov-web sshd\[20621\]: Invalid user himanshu from 106.12.176.53 port 33944
Mar  9 06:03:20 ourumov-web sshd\[20621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.53
Mar  9 06:03:23 ourumov-web sshd\[20621\]: Failed password for invalid user himanshu from 106.12.176.53 port 33944 ssh2
...
2020-03-09 17:29:00
51.159.35.94 attackbots
Mar  9 08:41:56 *** sshd[11143]: Invalid user cpanelphppgadmin from 51.159.35.94
2020-03-09 17:54:47
203.176.179.210 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-09 18:02:44
61.165.36.240 attack
Unauthorized connection attempt from IP address 61.165.36.240 on Port 445(SMB)
2020-03-09 17:59:11
217.64.98.169 attackbotsspam
Unauthorised access (Mar  9) SRC=217.64.98.169 LEN=44 TOS=0x08 PREC=0x40 TTL=239 ID=45340 TCP DPT=445 WINDOW=1024 SYN
2020-03-09 18:01:40
62.138.239.100 spam
MARRE de ces ORDURES et autres FILS de PUTE genre SOUS MERDES capables de POLLUER STUPIDEMENT pour ne pas dire CONNEMENT la Planète par des POURRIELS INUTILES sur des listes VOLÉES on ne sait où et SANS notre accord pour du SEXE !

w-bieker@t-online.de, camaramahamady@yahoo.fr and tatisere@list.ru to BURN / CLOSE / DELETTE / SOP IMMEDIATELY for SPAM, PHISHING and SCAM !

Message-ID: 
Content-Type: multipart/mixed; boundary="------------000002020604090504010201"
X-Priority: 3 (Normal)
From: "Nice Tatianulenka" 
Reply-To: "Nice Tatianulenka" 
To: camaramahamady@yahoo.fr

t-online.de => denic.de AS USUAL ! ! !

t-online.de => 62.138.239.100

denic.de => 81.91.170.12

https://www.mywot.com/scorecard/t-online.de

https://www.mywot.com/scorecard/denic.de

https://en.asytech.cn/check-ip/62.138.239.100

https://en.asytech.cn/check-ip/81.91.170.12

list.ru => go.mail.ru

list.ru => 217.69.139.53

go.mail.ru => 217.69.139.51

https://www.mywot.com/scorecard/list.ru

https://www.mywot.com/scorecard/mail.ru

https://www.mywot.com/scorecard/go.mail.ru

https://en.asytech.cn/check-ip/217.69.139.51

https://en.asytech.cn/check-ip/217.69.139.53
2020-03-09 17:53:56
51.38.238.87 attackbots
Mar  9 07:50:53 mail sshd[7333]: Invalid user x-bot from 51.38.238.87
Mar  9 07:50:53 mail sshd[7333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.87
Mar  9 07:50:53 mail sshd[7333]: Invalid user x-bot from 51.38.238.87
Mar  9 07:50:55 mail sshd[7333]: Failed password for invalid user x-bot from 51.38.238.87 port 44532 ssh2
...
2020-03-09 17:31:01
36.75.90.228 attackbotsspam
Unauthorized connection attempt from IP address 36.75.90.228 on Port 445(SMB)
2020-03-09 17:52:11
116.97.214.120 attack
Unauthorized connection attempt from IP address 116.97.214.120 on Port 445(SMB)
2020-03-09 17:50:05
14.143.74.186 attackspam
Unauthorized connection attempt from IP address 14.143.74.186 on Port 445(SMB)
2020-03-09 18:05:50
49.231.201.146 attackspambots
Unauthorized connection attempt from IP address 49.231.201.146 on Port 445(SMB)
2020-03-09 17:30:11
177.106.243.8 attackbots
1583725570 - 03/09/2020 04:46:10 Host: 177.106.243.8/177.106.243.8 Port: 445 TCP Blocked
2020-03-09 18:00:47
117.4.104.38 attackspam
Unauthorized connection attempt from IP address 117.4.104.38 on Port 445(SMB)
2020-03-09 18:00:00

Recently Reported IPs

104.21.93.147 104.21.93.149 104.21.93.151 104.21.93.153
104.21.93.155 104.21.93.157 104.21.93.159 104.21.93.160
104.21.93.16 104.21.93.161 104.21.93.162 104.21.93.163
104.21.93.166 104.21.93.165 104.21.93.167 104.21.93.169
104.21.93.168 104.21.93.170 104.21.93.173 104.21.93.171