Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.200.21.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1484
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.200.21.198.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032301 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 24 04:38:26 CST 2022
;; MSG SIZE  rcvd: 107
Host info
198.21.200.104.in-addr.arpa domain name pointer li799-198.members.linode.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
198.21.200.104.in-addr.arpa	name = li799-198.members.linode.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.135.73.141 attackbots
SSH login attempts.
2020-10-03 15:10:52
124.81.84.130 attackspam
1433/tcp 445/tcp...
[2020-08-28/10-02]6pkt,2pt.(tcp)
2020-10-03 15:17:00
71.6.233.156 attackspam
 TCP (SYN) 71.6.233.156:50880 -> port 50880, len 44
2020-10-03 15:25:00
179.97.52.197 attackbots
445/tcp 445/tcp 445/tcp
[2020-09-13/10-02]3pkt
2020-10-03 15:04:34
106.75.231.227 attackbotsspam
Oct  1 05:33:10 m3 sshd[13461]: Invalid user db from 106.75.231.227
Oct  1 05:33:11 m3 sshd[13461]: Failed password for invalid user db from 106.75.231.227 port 57632 ssh2
Oct  1 05:45:48 m3 sshd[14865]: Invalid user demo from 106.75.231.227


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.75.231.227
2020-10-03 14:53:26
103.102.114.70 attack
445/tcp 445/tcp 445/tcp
[2020-10-02]3pkt
2020-10-03 15:35:56
142.93.47.124 attack
8986/tcp 32222/tcp 7000/tcp...
[2020-08-07/10-02]177pkt,96pt.(tcp)
2020-10-03 15:28:31
182.61.137.235 attack
Oct  2 23:55:35 abendstille sshd\[26194\]: Invalid user mysql from 182.61.137.235
Oct  2 23:55:35 abendstille sshd\[26194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.137.235
Oct  2 23:55:37 abendstille sshd\[26194\]: Failed password for invalid user mysql from 182.61.137.235 port 37794 ssh2
Oct  2 23:59:26 abendstille sshd\[29846\]: Invalid user ftpuser from 182.61.137.235
Oct  2 23:59:26 abendstille sshd\[29846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.137.235
...
2020-10-03 15:07:37
190.248.156.82 attackspam
445/tcp 445/tcp
[2020-08-20/10-02]2pkt
2020-10-03 14:56:10
34.101.209.134 attackspambots
Invalid user gera from 34.101.209.134 port 45888
2020-10-03 15:39:17
49.233.183.15 attackspambots
Invalid user joomla from 49.233.183.15 port 54782
2020-10-03 15:12:52
185.250.44.11 attack
(mod_security) mod_security (id:210730) triggered by 185.250.44.11 (RU/Russia/-): 5 in the last 300 secs
2020-10-03 15:31:24
219.91.245.105 attack
445/tcp
[2020-10-02]1pkt
2020-10-03 15:34:31
51.91.120.67 attackspam
Triggered by Fail2Ban at Ares web server
2020-10-03 15:15:47
123.31.26.144 attackbots
Invalid user gera from 123.31.26.144 port 20448
2020-10-03 15:00:36

Recently Reported IPs

104.200.21.19 104.200.30.150 104.201.28.86 104.206.87.159
104.207.134.144 104.207.159.33 104.207.226.49 104.207.227.151
104.207.228.49 104.207.234.139 104.207.237.48 146.252.253.174
104.207.240.137 104.207.243.62 104.207.243.91 104.207.246.201
104.207.246.58 104.207.246.81 104.207.247.106 104.207.254.10