Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Latvia

Internet Service Provider: SIA Tet

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
2019-07-06 17:17:26 1hjmRJ-0002kb-Ht SMTP connection from \(\[91.105.102.21\]\) \[91.105.102.21\]:26825 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-06 17:17:39 1hjmRW-0002kx-6J SMTP connection from \(\[91.105.102.21\]\) \[91.105.102.21\]:26914 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-06 17:17:47 1hjmRe-0002l5-W4 SMTP connection from \(\[91.105.102.21\]\) \[91.105.102.21\]:26970 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 08:12:26
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.105.102.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20737
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;91.105.102.21.			IN	A

;; AUTHORITY SECTION:
.			448	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012702 1800 900 604800 86400

;; Query time: 274 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 08:12:23 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 21.102.105.91.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.102.105.91.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.30.249.49 attackbotsspam
2020-09-12T07:18:33+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-12 21:46:38
139.199.168.18 attackspam
Sep 12 08:32:13 root sshd[8507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.168.18 
...
2020-09-12 21:42:07
81.68.128.244 attackspam
 TCP (SYN) 81.68.128.244:40165 -> port 26510, len 44
2020-09-12 21:50:04
83.209.189.42 attackbots
2020-09-12T10:31:31.488217abusebot-3.cloudsearch.cf sshd[16301]: Invalid user pi from 83.209.189.42 port 39280
2020-09-12T10:31:32.048940abusebot-3.cloudsearch.cf sshd[16303]: Invalid user pi from 83.209.189.42 port 39281
2020-09-12T10:31:31.736271abusebot-3.cloudsearch.cf sshd[16301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=h83-209-189-42.cust.a3fiber.se
2020-09-12T10:31:31.488217abusebot-3.cloudsearch.cf sshd[16301]: Invalid user pi from 83.209.189.42 port 39280
2020-09-12T10:31:33.365405abusebot-3.cloudsearch.cf sshd[16301]: Failed password for invalid user pi from 83.209.189.42 port 39280 ssh2
2020-09-12T10:31:32.332147abusebot-3.cloudsearch.cf sshd[16303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=h83-209-189-42.cust.a3fiber.se
2020-09-12T10:31:32.048940abusebot-3.cloudsearch.cf sshd[16303]: Invalid user pi from 83.209.189.42 port 39281
2020-09-12T10:31:34.097003abusebot-3.cloudsearch.cf 
...
2020-09-12 21:49:01
203.195.204.122 attack
Sep 12 09:19:08 [-] sshd[21653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.204.122  user=root
Sep 12 09:19:10 [-] sshd[21653]: Failed password for invalid user root from 203.195.204.122 port 40518 ssh2
Sep 12 09:25:40 [-] sshd[21961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.204.122  user=root
2020-09-12 21:26:24
161.35.20.178 attack
Sep 12 13:50:52 *** sshd[30130]: Invalid user postgres from 161.35.20.178
2020-09-12 21:53:39
35.229.141.62 attackspam
Sep 12 10:14:43 IngegnereFirenze sshd[10581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.229.141.62  user=root
...
2020-09-12 21:25:19
92.222.180.221 attackbotsspam
Invalid user support from 92.222.180.221 port 45804
2020-09-12 21:44:11
46.101.43.224 attackspam
(sshd) Failed SSH login from 46.101.43.224 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 12 03:49:00 optimus sshd[10925]: Invalid user admin from 46.101.43.224
Sep 12 03:49:00 optimus sshd[10925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224 
Sep 12 03:49:02 optimus sshd[10925]: Failed password for invalid user admin from 46.101.43.224 port 45912 ssh2
Sep 12 03:57:36 optimus sshd[13071]: Invalid user admin from 46.101.43.224
Sep 12 03:57:36 optimus sshd[13071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224
2020-09-12 21:43:56
118.244.128.4 attack
Sep 12 14:59:16 ns41 sshd[13034]: Failed password for root from 118.244.128.4 port 18691 ssh2
Sep 12 14:59:16 ns41 sshd[13034]: Failed password for root from 118.244.128.4 port 18691 ssh2
2020-09-12 21:33:01
45.129.33.12 attackbots
 TCP (SYN) 45.129.33.12:55897 -> port 62694, len 44
2020-09-12 21:53:27
61.177.172.168 attackspambots
2020-09-12T16:34:35.613696afi-git.jinr.ru sshd[13025]: Failed password for root from 61.177.172.168 port 44197 ssh2
2020-09-12T16:34:38.627215afi-git.jinr.ru sshd[13025]: Failed password for root from 61.177.172.168 port 44197 ssh2
2020-09-12T16:34:42.258046afi-git.jinr.ru sshd[13025]: Failed password for root from 61.177.172.168 port 44197 ssh2
2020-09-12T16:34:45.564770afi-git.jinr.ru sshd[13025]: Failed password for root from 61.177.172.168 port 44197 ssh2
2020-09-12T16:34:49.006783afi-git.jinr.ru sshd[13025]: Failed password for root from 61.177.172.168 port 44197 ssh2
...
2020-09-12 21:39:14
49.232.101.33 attack
Sep 12 15:01:19 fhem-rasp sshd[16341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.101.33  user=root
Sep 12 15:01:21 fhem-rasp sshd[16341]: Failed password for root from 49.232.101.33 port 40118 ssh2
...
2020-09-12 21:46:57
78.128.113.120 attackspambots
Sep 12 15:28:59 relay postfix/smtpd\[9663\]: warning: unknown\[78.128.113.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 15:29:20 relay postfix/smtpd\[9663\]: warning: unknown\[78.128.113.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 15:29:40 relay postfix/smtpd\[3974\]: warning: unknown\[78.128.113.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 15:29:59 relay postfix/smtpd\[4037\]: warning: unknown\[78.128.113.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 15:37:28 relay postfix/smtpd\[6525\]: warning: unknown\[78.128.113.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-12 21:50:29
45.119.83.68 attack
Sep 12 12:50:10 instance-2 sshd[11711]: Failed password for root from 45.119.83.68 port 42832 ssh2
Sep 12 12:54:34 instance-2 sshd[11851]: Failed password for root from 45.119.83.68 port 47290 ssh2
Sep 12 12:58:48 instance-2 sshd[11972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.68
2020-09-12 21:20:51

Recently Reported IPs

122.194.86.140 126.182.127.135 121.201.107.156 121.57.164.204
117.66.141.18 117.27.200.217 115.213.178.198 115.209.115.151
115.148.43.3 114.238.91.94 114.102.11.107 114.102.8.245
113.121.45.153 113.78.65.107 112.83.143.43 103.108.63.50
90.77.134.51 61.145.8.130 53.86.207.8 42.119.221.5