Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.172.104.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42233
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.172.104.2.			IN	A

;; AUTHORITY SECTION:
.			298	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100200 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 02 20:16:07 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 2.104.172.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.104.172.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.223.30.167 attack
Sep 19 21:09:14 CT721 sshd[1197042]: Invalid user castis from 185.223.30.167
Sep 19 21:09:14 CT721 sshd[1197042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.223.30.167
Sep 19 21:09:15 CT721 sshd[1197042]: Failed password for invalid user castis from 185.223.30.167 port 52339 ssh2
Sep 19 21:09:15 CT721 sshd[1197042]: Received disconnect from 185.223.30.167: 11: Bye Bye [preauth]
Sep 19 21:13:27 CT721 sshd[1197208]: Invalid user guest3 from 185.223.30.167
Sep 19 21:13:27 CT721 sshd[1197208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.223.30.167


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.223.30.167
2019-09-20 05:07:54
190.90.95.146 attackbotsspam
Sep 19 20:37:25 MK-Soft-VM3 sshd\[22389\]: Invalid user warehouse from 190.90.95.146 port 47010
Sep 19 20:37:25 MK-Soft-VM3 sshd\[22389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.90.95.146
Sep 19 20:37:27 MK-Soft-VM3 sshd\[22389\]: Failed password for invalid user warehouse from 190.90.95.146 port 47010 ssh2
...
2019-09-20 05:28:08
80.82.70.118 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-20 05:18:22
58.214.9.102 attackbots
Sep 19 09:56:58 web1 sshd\[10309\]: Invalid user deploy from 58.214.9.102
Sep 19 09:56:58 web1 sshd\[10309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.214.9.102
Sep 19 09:57:00 web1 sshd\[10309\]: Failed password for invalid user deploy from 58.214.9.102 port 54778 ssh2
Sep 19 10:00:21 web1 sshd\[10639\]: Invalid user bb2 from 58.214.9.102
Sep 19 10:00:21 web1 sshd\[10639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.214.9.102
2019-09-20 05:26:37
219.135.194.77 attackbotsspam
Trying to log into mailserver (postfix/smtp) using multiple names and passwords
2019-09-20 05:30:05
134.209.64.10 attackbotsspam
Sep 19 10:52:04 sachi sshd\[4847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10  user=daemon
Sep 19 10:52:06 sachi sshd\[4847\]: Failed password for daemon from 134.209.64.10 port 60610 ssh2
Sep 19 10:56:15 sachi sshd\[5230\]: Invalid user pg from 134.209.64.10
Sep 19 10:56:15 sachi sshd\[5230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10
Sep 19 10:56:16 sachi sshd\[5230\]: Failed password for invalid user pg from 134.209.64.10 port 46830 ssh2
2019-09-20 05:12:09
106.12.32.48 attackbots
Sep 19 10:59:23 friendsofhawaii sshd\[28609\]: Invalid user unit from 106.12.32.48
Sep 19 10:59:23 friendsofhawaii sshd\[28609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.32.48
Sep 19 10:59:24 friendsofhawaii sshd\[28609\]: Failed password for invalid user unit from 106.12.32.48 port 43790 ssh2
Sep 19 11:03:13 friendsofhawaii sshd\[28920\]: Invalid user didier from 106.12.32.48
Sep 19 11:03:14 friendsofhawaii sshd\[28920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.32.48
2019-09-20 05:15:42
27.128.229.236 attack
2019-09-19T22:12:38.977447lon01.zurich-datacenter.net sshd\[6098\]: Invalid user bamboo from 27.128.229.236 port 50840
2019-09-19T22:12:38.983853lon01.zurich-datacenter.net sshd\[6098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.229.236
2019-09-19T22:12:40.318004lon01.zurich-datacenter.net sshd\[6098\]: Failed password for invalid user bamboo from 27.128.229.236 port 50840 ssh2
2019-09-19T22:15:49.226565lon01.zurich-datacenter.net sshd\[6198\]: Invalid user pi from 27.128.229.236 port 37619
2019-09-19T22:15:49.235441lon01.zurich-datacenter.net sshd\[6198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.229.236
...
2019-09-20 05:04:13
162.247.74.7 attack
Sep 19 21:33:18 cvbmail sshd\[3984\]: Invalid user 2Wire from 162.247.74.7
Sep 19 21:33:18 cvbmail sshd\[3984\]: Failed none for invalid user 2Wire from 162.247.74.7 port 42968 ssh2
Sep 19 21:33:22 cvbmail sshd\[3986\]: Invalid user 3comcso from 162.247.74.7
Sep 19 21:33:22 cvbmail sshd\[3986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.7
2019-09-20 05:24:58
222.186.175.6 attackbots
Sep 19 21:26:49 hcbbdb sshd\[16309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.6  user=root
Sep 19 21:26:51 hcbbdb sshd\[16309\]: Failed password for root from 222.186.175.6 port 10490 ssh2
Sep 19 21:27:04 hcbbdb sshd\[16309\]: Failed password for root from 222.186.175.6 port 10490 ssh2
Sep 19 21:27:08 hcbbdb sshd\[16309\]: Failed password for root from 222.186.175.6 port 10490 ssh2
Sep 19 21:27:17 hcbbdb sshd\[16361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.6  user=root
2019-09-20 05:34:27
36.89.163.178 attackbots
Sep 19 17:12:52 ny01 sshd[3230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.163.178
Sep 19 17:12:53 ny01 sshd[3230]: Failed password for invalid user alban from 36.89.163.178 port 53494 ssh2
Sep 19 17:18:40 ny01 sshd[4337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.163.178
2019-09-20 05:23:21
164.132.100.28 attackspam
Sep 19 11:07:52 kapalua sshd\[25430\]: Invalid user nn from 164.132.100.28
Sep 19 11:07:52 kapalua sshd\[25430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=28.ip-164-132-100.eu
Sep 19 11:07:54 kapalua sshd\[25430\]: Failed password for invalid user nn from 164.132.100.28 port 51840 ssh2
Sep 19 11:12:17 kapalua sshd\[25950\]: Invalid user user1 from 164.132.100.28
Sep 19 11:12:17 kapalua sshd\[25950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=28.ip-164-132-100.eu
2019-09-20 05:13:25
159.65.126.166 attackbotsspam
Sep 19 21:13:14 HOSTNAME sshd[3960]: Address 159.65.126.166 maps to 170582.cloudwaysapps.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 19 21:13:14 HOSTNAME sshd[3960]: Invalid user wyf from 159.65.126.166 port 55585
Sep 19 21:13:14 HOSTNAME sshd[3960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.126.166


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.65.126.166
2019-09-20 05:06:12
157.230.144.158 attackspambots
Sep 20 02:47:38 areeb-Workstation sshd[28813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.144.158
Sep 20 02:47:39 areeb-Workstation sshd[28813]: Failed password for invalid user ubnt from 157.230.144.158 port 57198 ssh2
...
2019-09-20 05:35:37
13.124.79.167 attackbotsspam
Automated report - ssh fail2ban:
Sep 19 22:20:44 authentication failure 
Sep 19 22:20:47 wrong password, user=temp, port=35890, ssh2
Sep 19 22:26:02 authentication failure
2019-09-20 05:12:57

Recently Reported IPs

77.162.222.3 127.168.33.141 4.242.3.32 13.73.21.208
213.166.96.35 85.145.112.196 99.219.227.71 166.170.37.14
47.98.225.1 125.253.58.17 209.249.2.242 240.91.1.51
42.33.148.205 142.180.173.28 123.251.96.31 173.95.10.147
122.58.211.67 89.64.89.79 165.171.2.115 39.78.157.198