Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.52.104.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.52.104.210.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 21:23:40 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 210.104.52.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 210.104.52.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.170.227.141 attack
$f2bV_matches
2020-07-11 15:26:56
138.59.97.130 attackbotsspam
Lines containing failures of 138.59.97.130
Jul  8 18:33:45 shared09 sshd[22647]: Invalid user yaoyinqi from 138.59.97.130 port 7265
Jul  8 18:33:45 shared09 sshd[22647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.59.97.130
Jul  8 18:33:47 shared09 sshd[22647]: Failed password for invalid user yaoyinqi from 138.59.97.130 port 7265 ssh2
Jul  8 18:33:48 shared09 sshd[22647]: Received disconnect from 138.59.97.130 port 7265:11: Bye Bye [preauth]
Jul  8 18:33:48 shared09 sshd[22647]: Disconnected from invalid user yaoyinqi 138.59.97.130 port 7265 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=138.59.97.130
2020-07-11 15:36:30
138.197.66.68 attack
2020-07-11T05:53:47+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-07-11 15:37:18
106.13.167.3 attackbots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-11 15:34:11
159.65.41.104 attackspam
Jul 11 07:19:03 *** sshd[30536]: Invalid user shuosen from 159.65.41.104
2020-07-11 15:20:02
120.132.13.206 attack
Jul 11 05:40:35 nas sshd[29691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.13.206 
Jul 11 05:40:37 nas sshd[29691]: Failed password for invalid user rosemary from 120.132.13.206 port 48638 ssh2
Jul 11 05:53:46 nas sshd[30224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.13.206 
...
2020-07-11 15:38:51
5.89.59.163 attackspam
Automatic report - Banned IP Access
2020-07-11 15:25:30
122.51.204.47 attack
Jul 11 01:37:06 Tower sshd[1466]: Connection from 122.51.204.47 port 36110 on 192.168.10.220 port 22 rdomain ""
Jul 11 01:37:08 Tower sshd[1466]: Invalid user test from 122.51.204.47 port 36110
Jul 11 01:37:08 Tower sshd[1466]: error: Could not get shadow information for NOUSER
Jul 11 01:37:08 Tower sshd[1466]: Failed password for invalid user test from 122.51.204.47 port 36110 ssh2
Jul 11 01:37:10 Tower sshd[1466]: Received disconnect from 122.51.204.47 port 36110:11: Bye Bye [preauth]
Jul 11 01:37:10 Tower sshd[1466]: Disconnected from invalid user test 122.51.204.47 port 36110 [preauth]
2020-07-11 15:39:35
152.136.165.25 attackspam
Invalid user brian from 152.136.165.25 port 46374
2020-07-11 15:20:54
191.53.238.180 attackspam
(smtpauth) Failed SMTP AUTH login from 191.53.238.180 (BR/Brazil/191-53-238-180.ptu-wr.mastercabo.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-11 08:24:13 plain authenticator failed for ([191.53.238.180]) [191.53.238.180]: 535 Incorrect authentication data (set_id=info@nazhvangiah.com)
2020-07-11 15:16:00
117.33.128.218 attackbots
Jul 11 06:04:20 rocket sshd[10277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.128.218
Jul 11 06:04:22 rocket sshd[10277]: Failed password for invalid user love from 117.33.128.218 port 44872 ssh2
...
2020-07-11 15:39:53
222.252.24.115 attackbots
20/7/10@23:54:19: FAIL: Alarm-Network address from=222.252.24.115
...
2020-07-11 15:14:57
178.33.67.12 attackbots
Jul 11 08:56:34 Invalid user katina from 178.33.67.12 port 34632
2020-07-11 15:39:17
187.155.209.200 attackbots
Jul 11 10:31:34 gw1 sshd[16878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.155.209.200
Jul 11 10:31:36 gw1 sshd[16878]: Failed password for invalid user warren from 187.155.209.200 port 39270 ssh2
...
2020-07-11 15:07:56
85.106.97.115 attack
Automatic report - XMLRPC Attack
2020-07-11 15:32:25

Recently Reported IPs

39.226.255.80 3.89.9.175 227.172.16.71 127.44.125.135
231.6.221.137 238.168.165.186 205.190.220.196 51.6.125.78
40.60.19.184 129.128.170.96 173.62.79.245 47.186.79.45
20.253.67.130 58.21.237.10 131.69.81.121 66.180.62.94
205.183.188.124 205.198.45.32 15.118.116.235 132.249.222.77