Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Juelsminde

Region: Central Jutland

Country: Denmark

Internet Service Provider: TDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.104.61.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19954
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.104.61.121.			IN	A

;; AUTHORITY SECTION:
.			375	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030501 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 06 05:52:58 CST 2020
;; MSG SIZE  rcvd: 116
Host info
121.61.104.2.in-addr.arpa domain name pointer 2-104-61-121-cable.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.61.104.2.in-addr.arpa	name = 2-104-61-121-cable.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
223.241.247.214 attackspam
2019-10-05T07:22:36.7224441495-001 sshd\[12032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.241.247.214  user=root
2019-10-05T07:22:38.6393941495-001 sshd\[12032\]: Failed password for root from 223.241.247.214 port 57808 ssh2
2019-10-05T07:27:54.6233221495-001 sshd\[12467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.241.247.214  user=root
2019-10-05T07:27:55.8623941495-001 sshd\[12467\]: Failed password for root from 223.241.247.214 port 48099 ssh2
2019-10-05T07:32:41.2228641495-001 sshd\[12730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.241.247.214  user=root
2019-10-05T07:32:43.5306381495-001 sshd\[12730\]: Failed password for root from 223.241.247.214 port 38378 ssh2
...
2019-10-05 19:44:10
81.2.47.181 attack
postfix
2019-10-05 20:02:33
5.152.159.31 attack
Oct  5 01:33:53 friendsofhawaii sshd\[8979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.152.159.31  user=root
Oct  5 01:33:55 friendsofhawaii sshd\[8979\]: Failed password for root from 5.152.159.31 port 57266 ssh2
Oct  5 01:37:45 friendsofhawaii sshd\[9315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.152.159.31  user=root
Oct  5 01:37:47 friendsofhawaii sshd\[9315\]: Failed password for root from 5.152.159.31 port 49367 ssh2
Oct  5 01:41:42 friendsofhawaii sshd\[9761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.152.159.31  user=root
2019-10-05 19:53:00
222.186.15.65 attackbotsspam
Oct  5 13:49:14 nextcloud sshd\[29671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.65  user=root
Oct  5 13:49:16 nextcloud sshd\[29671\]: Failed password for root from 222.186.15.65 port 54648 ssh2
Oct  5 13:49:34 nextcloud sshd\[29671\]: Failed password for root from 222.186.15.65 port 54648 ssh2
...
2019-10-05 19:50:18
187.170.234.17 attack
port scan and connect, tcp 23 (telnet)
2019-10-05 19:27:19
94.177.215.195 attackbotsspam
Oct  5 01:37:52 web9 sshd\[1292\]: Invalid user Par0la-123 from 94.177.215.195
Oct  5 01:37:52 web9 sshd\[1292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.215.195
Oct  5 01:37:54 web9 sshd\[1292\]: Failed password for invalid user Par0la-123 from 94.177.215.195 port 60798 ssh2
Oct  5 01:41:55 web9 sshd\[2041\]: Invalid user 1q2w3e4r5t6y7u8i from 94.177.215.195
Oct  5 01:41:55 web9 sshd\[2041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.215.195
2019-10-05 19:45:58
51.77.140.36 attackspam
Oct  5 07:41:39 plusreed sshd[11915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.36  user=root
Oct  5 07:41:41 plusreed sshd[11915]: Failed password for root from 51.77.140.36 port 41734 ssh2
...
2019-10-05 19:52:29
190.190.40.203 attackspambots
Oct  5 10:17:39 venus sshd\[31536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.190.40.203  user=root
Oct  5 10:17:41 venus sshd\[31536\]: Failed password for root from 190.190.40.203 port 54808 ssh2
Oct  5 10:22:54 venus sshd\[31635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.190.40.203  user=root
...
2019-10-05 19:32:46
178.88.115.126 attackbots
Oct  5 07:01:43 www2 sshd\[5426\]: Failed password for root from 178.88.115.126 port 49588 ssh2Oct  5 07:06:21 www2 sshd\[6096\]: Failed password for root from 178.88.115.126 port 33460 ssh2Oct  5 07:10:58 www2 sshd\[6671\]: Failed password for root from 178.88.115.126 port 45562 ssh2
...
2019-10-05 19:40:12
45.119.83.62 attackbots
Jul 10 01:15:59 vtv3 sshd\[7142\]: Invalid user user from 45.119.83.62 port 50746
Jul 10 01:15:59 vtv3 sshd\[7142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.62
Jul 10 01:16:01 vtv3 sshd\[7142\]: Failed password for invalid user user from 45.119.83.62 port 50746 ssh2
Jul 10 01:17:56 vtv3 sshd\[7915\]: Invalid user qa from 45.119.83.62 port 39386
Jul 10 01:17:56 vtv3 sshd\[7915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.62
Jul 10 01:29:01 vtv3 sshd\[12967\]: Invalid user test5 from 45.119.83.62 port 55956
Jul 10 01:29:01 vtv3 sshd\[12967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.62
Jul 10 01:29:03 vtv3 sshd\[12967\]: Failed password for invalid user test5 from 45.119.83.62 port 55956 ssh2
Jul 10 01:30:54 vtv3 sshd\[14132\]: Invalid user mabel from 45.119.83.62 port 44612
Jul 10 01:30:54 vtv3 sshd\[14132\]: pam_unix\(sshd:auth\): a
2019-10-05 19:38:56
171.237.92.31 attackbots
Chat Spam
2019-10-05 20:00:16
141.98.81.38 attack
detected by Fail2Ban
2019-10-05 19:48:38
183.236.27.135 attack
Unauthorised access (Oct  5) SRC=183.236.27.135 LEN=40 TOS=0x04 TTL=48 ID=55121 TCP DPT=8080 WINDOW=60733 SYN 
Unauthorised access (Oct  5) SRC=183.236.27.135 LEN=40 TOS=0x04 TTL=49 ID=24461 TCP DPT=8080 WINDOW=63525 SYN 
Unauthorised access (Oct  2) SRC=183.236.27.135 LEN=40 TOS=0x04 TTL=47 ID=17682 TCP DPT=8080 WINDOW=60733 SYN
2019-10-05 19:37:33
106.12.105.193 attack
Oct  4 23:58:06 hpm sshd\[30763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.105.193  user=root
Oct  4 23:58:08 hpm sshd\[30763\]: Failed password for root from 106.12.105.193 port 48846 ssh2
Oct  5 00:02:52 hpm sshd\[31201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.105.193  user=root
Oct  5 00:02:54 hpm sshd\[31201\]: Failed password for root from 106.12.105.193 port 55626 ssh2
Oct  5 00:07:32 hpm sshd\[31588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.105.193  user=root
2019-10-05 19:28:09
173.161.242.217 attackbots
Oct  5 01:31:54 hanapaa sshd\[7265\]: Invalid user P4sswort@123 from 173.161.242.217
Oct  5 01:31:54 hanapaa sshd\[7265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-161-242-217-philadelphia.hfc.comcastbusiness.net
Oct  5 01:31:56 hanapaa sshd\[7265\]: Failed password for invalid user P4sswort@123 from 173.161.242.217 port 5094 ssh2
Oct  5 01:41:54 hanapaa sshd\[8179\]: Invalid user Lille!23 from 173.161.242.217
Oct  5 01:41:54 hanapaa sshd\[8179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-161-242-217-philadelphia.hfc.comcastbusiness.net
2019-10-05 19:46:19

Recently Reported IPs

31.163.214.199 219.213.209.224 46.201.140.9 87.53.164.218
180.93.205.23 77.54.28.219 195.138.67.165 177.97.172.152
42.55.246.228 144.13.77.198 2.217.229.221 163.11.62.245
197.133.176.254 12.50.26.40 50.253.54.203 45.47.92.103
82.230.240.186 95.179.142.195 72.198.98.99 207.235.81.190