Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.17.21.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22182
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.17.21.99.			IN	A

;; AUTHORITY SECTION:
.			93	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 17:15:58 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 99.21.17.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.21.17.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.144.48.34 attackspam
k+ssh-bruteforce
2020-10-10 05:03:10
202.0.103.51 attack
202.0.103.51 - - [09/Oct/2020:21:07:36 +0000] "POST /wp-login.php HTTP/1.1" 200 2075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
202.0.103.51 - - [09/Oct/2020:21:07:39 +0000] "POST /wp-login.php HTTP/1.1" 200 2074 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
202.0.103.51 - - [09/Oct/2020:21:07:42 +0000] "POST /wp-login.php HTTP/1.1" 200 2071 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
202.0.103.51 - - [09/Oct/2020:21:07:45 +0000] "POST /wp-login.php HTTP/1.1" 200 2072 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
202.0.103.51 - - [09/Oct/2020:21:07:46 +0000] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
2020-10-10 05:23:10
103.45.179.86 attack
5x Failed Password
2020-10-10 05:02:57
34.122.249.54 attackspam
Oct  9 21:32:51 Ubuntu-1404-trusty-64-minimal sshd\[22784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.122.249.54  user=root
Oct  9 21:32:53 Ubuntu-1404-trusty-64-minimal sshd\[22784\]: Failed password for root from 34.122.249.54 port 59288 ssh2
Oct  9 21:33:46 Ubuntu-1404-trusty-64-minimal sshd\[23527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.122.249.54  user=root
Oct  9 21:33:48 Ubuntu-1404-trusty-64-minimal sshd\[23527\]: Failed password for root from 34.122.249.54 port 55254 ssh2
Oct  9 21:34:40 Ubuntu-1404-trusty-64-minimal sshd\[23927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.122.249.54  user=root
2020-10-10 05:07:32
175.206.147.232 attackbotsspam
 TCP (SYN) 175.206.147.232:29954 -> port 23, len 44
2020-10-10 05:16:29
134.209.191.184 attackspambots
Oct  9 22:53:52 s1 sshd\[15995\]: Invalid user administrator from 134.209.191.184 port 43420
Oct  9 22:53:52 s1 sshd\[15995\]: Failed password for invalid user administrator from 134.209.191.184 port 43420 ssh2
Oct  9 22:56:56 s1 sshd\[16954\]: Invalid user fish from 134.209.191.184 port 48006
Oct  9 22:56:56 s1 sshd\[16954\]: Failed password for invalid user fish from 134.209.191.184 port 48006 ssh2
Oct  9 23:00:05 s1 sshd\[17365\]: User root from 134.209.191.184 not allowed because not listed in AllowUsers
Oct  9 23:00:05 s1 sshd\[17365\]: Failed password for invalid user root from 134.209.191.184 port 52580 ssh2
...
2020-10-10 05:14:12
51.38.211.30 attackbotsspam
Automatic report - XMLRPC Attack
2020-10-10 05:26:36
121.204.141.232 attackspambots
Oct  9 18:24:19 ws12vmsma01 sshd[31098]: Failed password for root from 121.204.141.232 port 56538 ssh2
Oct  9 18:26:14 ws12vmsma01 sshd[31358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.141.232  user=root
Oct  9 18:26:16 ws12vmsma01 sshd[31358]: Failed password for root from 121.204.141.232 port 51770 ssh2
...
2020-10-10 05:27:14
61.177.172.61 attack
Oct  9 23:20:14 vm2 sshd[4386]: Failed password for root from 61.177.172.61 port 29382 ssh2
Oct  9 23:20:27 vm2 sshd[4386]: error: maximum authentication attempts exceeded for root from 61.177.172.61 port 29382 ssh2 [preauth]
...
2020-10-10 05:25:15
82.138.21.54 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "dircreate" at 2020-10-08T20:48:19Z
2020-10-10 05:08:17
218.92.0.173 attack
Failed password for invalid user from 218.92.0.173 port 18206 ssh2
2020-10-10 05:26:51
118.25.183.69 attackspambots
SSH invalid-user multiple login try
2020-10-10 05:20:21
194.26.25.116 attack
 TCP (SYN) 194.26.25.116:59754 -> port 33333, len 44
2020-10-10 05:29:27
49.7.14.184 attackspam
Oct  9 15:16:54 vps639187 sshd\[10041\]: Invalid user test from 49.7.14.184 port 42818
Oct  9 15:16:54 vps639187 sshd\[10041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.7.14.184
Oct  9 15:16:56 vps639187 sshd\[10041\]: Failed password for invalid user test from 49.7.14.184 port 42818 ssh2
...
2020-10-10 05:20:04
208.109.11.34 attack
Oct  9 22:06:09 lnxded64 sshd[32540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.11.34
2020-10-10 05:03:25

Recently Reported IPs

104.17.21.68 104.17.210.54 104.17.210.87 104.17.210.9
104.17.211.15 104.17.211.54 104.17.211.87 104.17.212.66
104.17.212.85 104.17.212.96 104.17.213.193 104.17.213.66
104.17.213.85 104.17.213.96 104.17.214.193 104.17.214.6
104.17.215.44 104.17.215.52 104.17.215.6 162.158.114.227