Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.111.21.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 77
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.111.21.204.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 13:43:57 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 204.21.111.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 204.21.111.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.32.253.202 attackspam
phpMyAdmin connection attempt
2019-12-04 05:08:44
103.14.45.98 attackspam
A spam blank email was sent from this SMTP server. All To headers of this kind of spam emails were "To: undisclosed-recipients:;".
2019-12-04 05:13:40
46.4.237.235 attackbots
Dec  3 10:49:15 php1 sshd\[27471\]: Invalid user fantino from 46.4.237.235
Dec  3 10:49:15 php1 sshd\[27471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.4.237.235
Dec  3 10:49:16 php1 sshd\[27471\]: Failed password for invalid user fantino from 46.4.237.235 port 56608 ssh2
Dec  3 10:54:29 php1 sshd\[27910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.4.237.235  user=root
Dec  3 10:54:31 php1 sshd\[27910\]: Failed password for root from 46.4.237.235 port 39980 ssh2
2019-12-04 05:40:36
80.211.180.23 attack
Dec  3 18:00:31 server sshd\[32717\]: Invalid user elizabeth from 80.211.180.23
Dec  3 18:00:31 server sshd\[32717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.180.23 
Dec  3 18:00:33 server sshd\[32717\]: Failed password for invalid user elizabeth from 80.211.180.23 port 41664 ssh2
Dec  3 23:22:27 server sshd\[26007\]: Invalid user mingli from 80.211.180.23
Dec  3 23:22:27 server sshd\[26007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.180.23 
...
2019-12-04 05:21:30
99.185.76.161 attackbotsspam
Dec  3 07:12:31 php1 sshd\[21329\]: Invalid user guest from 99.185.76.161
Dec  3 07:12:31 php1 sshd\[21329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99-185-76-161.lightspeed.clmasc.sbcglobal.net
Dec  3 07:12:32 php1 sshd\[21329\]: Failed password for invalid user guest from 99.185.76.161 port 56382 ssh2
Dec  3 07:18:16 php1 sshd\[22060\]: Invalid user w from 99.185.76.161
Dec  3 07:18:16 php1 sshd\[22060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99-185-76-161.lightspeed.clmasc.sbcglobal.net
2019-12-04 05:39:34
149.202.188.76 attackspam
Wordpress GET /wp-login.php attack (Automatically banned forever)
2019-12-04 05:45:24
14.116.212.214 attackspam
Dec  3 18:18:15 localhost sshd\[21512\]: Invalid user yeziyan from 14.116.212.214 port 49629
Dec  3 18:18:15 localhost sshd\[21512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.212.214
Dec  3 18:18:17 localhost sshd\[21512\]: Failed password for invalid user yeziyan from 14.116.212.214 port 49629 ssh2
Dec  3 18:25:08 localhost sshd\[21766\]: Invalid user sammut from 14.116.212.214 port 52084
Dec  3 18:25:08 localhost sshd\[21766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.212.214
...
2019-12-04 05:11:43
45.253.26.34 attackbotsspam
Dec  3 08:15:45 dallas01 sshd[31251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.253.26.34
Dec  3 08:15:47 dallas01 sshd[31251]: Failed password for invalid user host from 45.253.26.34 port 36442 ssh2
Dec  3 08:23:39 dallas01 sshd[32534]: Failed password for root from 45.253.26.34 port 40446 ssh2
2019-12-04 05:40:54
103.92.225.95 attack
A spam blank email was sent from this SMTP server. All To headers of this kind of spam emails were "To: undisclosed-recipients:;".
2019-12-04 05:30:00
35.220.207.211 attackspambots
*Port Scan* detected from 35.220.207.211 (211.207.220.35.bc.googleusercontent.com). 11 hits in the last 286 seconds
2019-12-04 05:15:24
197.43.154.90 attackbots
Port 1433 Scan
2019-12-04 05:18:23
123.188.207.4 attack
Unauthorised access (Dec  3) SRC=123.188.207.4 LEN=40 TTL=114 ID=41507 TCP DPT=8080 WINDOW=37950 SYN 
Unauthorised access (Dec  3) SRC=123.188.207.4 LEN=40 TTL=114 ID=8222 TCP DPT=8080 WINDOW=18533 SYN 
Unauthorised access (Dec  3) SRC=123.188.207.4 LEN=40 TTL=114 ID=8255 TCP DPT=8080 WINDOW=52598 SYN 
Unauthorised access (Dec  2) SRC=123.188.207.4 LEN=40 TTL=114 ID=9662 TCP DPT=8080 WINDOW=57190 SYN 
Unauthorised access (Dec  2) SRC=123.188.207.4 LEN=40 TTL=114 ID=11144 TCP DPT=8080 WINDOW=61490 SYN 
Unauthorised access (Dec  1) SRC=123.188.207.4 LEN=40 TTL=114 ID=26989 TCP DPT=8080 WINDOW=43658 SYN 
Unauthorised access (Dec  1) SRC=123.188.207.4 LEN=40 TTL=114 ID=32727 TCP DPT=8080 WINDOW=27252 SYN
2019-12-04 05:36:28
103.99.196.10 attack
A spam blank email was sent from this SMTP server. All To headers of this kind of spam emails were "To: undisclosed-recipients:;".
2019-12-04 05:38:27
101.89.151.127 attackbots
Failed password for root from 101.89.151.127 port 52536 ssh2
2019-12-04 05:20:17
198.1.65.159 attackbots
Unauthorized SSH login attempts
2019-12-04 05:44:40

Recently Reported IPs

206.124.252.72 151.208.97.187 193.135.142.84 139.19.24.55
192.129.112.149 208.56.36.36 213.216.53.102 9.241.94.123
43.247.6.72 6.218.226.143 74.222.203.95 202.84.178.145
187.201.21.214 12.180.118.193 7.164.21.119 139.194.247.223
48.221.145.52 240.98.248.129 219.233.153.59 204.233.95.177