Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.128.121.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.128.121.21.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 00:37:25 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 21.121.128.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.121.128.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.131.45.150 attackspam
20 attempts against mh-ssh on cloud
2020-08-19 13:23:29
122.117.154.90 attackspam
1597809341 - 08/19/2020 05:55:41 Host: 122.117.154.90/122.117.154.90 Port: 23 TCP Blocked
...
2020-08-19 12:56:44
97.119.235.89 attackspam
"SSH brute force auth login attempt."
2020-08-19 13:23:56
77.48.47.102 attackspambots
reported through recidive - multiple failed attempts(SSH)
2020-08-19 12:47:02
113.181.72.249 attackbots
1597809313 - 08/19/2020 05:55:13 Host: 113.181.72.249/113.181.72.249 Port: 445 TCP Blocked
2020-08-19 13:14:18
107.175.150.83 attackbots
$f2bV_matches
2020-08-19 12:47:30
123.207.94.252 attackspambots
Invalid user mdh from 123.207.94.252 port 52090
2020-08-19 13:10:09
115.159.66.109 attack
Tried sshing with brute force.
2020-08-19 13:00:20
118.27.11.126 attack
2020-08-19T05:55:43.676540centos sshd[6093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.11.126
2020-08-19T05:55:43.668776centos sshd[6093]: Invalid user remo from 118.27.11.126 port 60282
2020-08-19T05:55:45.953525centos sshd[6093]: Failed password for invalid user remo from 118.27.11.126 port 60282 ssh2
...
2020-08-19 12:54:03
45.143.222.141 attackspam
2020-08-19 12:51:51
185.165.169.168 attack
Invalid user we from 185.165.169.168 port 38618
2020-08-19 12:53:39
140.238.25.151 attackspambots
Aug 19 04:40:23 plex-server sshd[3672784]: Failed password for invalid user elasticsearch from 140.238.25.151 port 56350 ssh2
Aug 19 04:42:23 plex-server sshd[3673557]: Invalid user yuh from 140.238.25.151 port 57902
Aug 19 04:42:23 plex-server sshd[3673557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.25.151 
Aug 19 04:42:23 plex-server sshd[3673557]: Invalid user yuh from 140.238.25.151 port 57902
Aug 19 04:42:25 plex-server sshd[3673557]: Failed password for invalid user yuh from 140.238.25.151 port 57902 ssh2
...
2020-08-19 12:57:32
106.54.145.68 attackspambots
Invalid user obama from 106.54.145.68 port 33838
2020-08-19 13:10:42
129.144.183.81 attackbots
$f2bV_matches
2020-08-19 12:59:00
212.70.149.68 attackspam
Aug 19 07:59:20 www postfix/smtpd[13888]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 19 08:01:06 www postfix/smtpd[13888]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 19 08:02:50 www postfix/smtpd[13888]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 19 08:04:34 www postfix/smtpd[13888]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 19 08:06:21 www postfix/smtpd[13888]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-19 13:07:49

Recently Reported IPs

104.110.240.34 104.128.121.160 104.128.121.175 104.128.121.227
104.128.121.240 104.128.121.189 104.128.121.200 104.128.121.26
104.128.121.229 104.128.121.251 104.128.121.94 104.128.121.97
103.204.124.18 104.128.175.162 104.128.161.33 104.128.228.11
104.128.228.185 104.128.224.22 104.128.233.17 104.128.206.123