Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.13.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29382
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.13.189.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 154 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 11:39:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 189.13.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.13.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.138.51.140 attackspambots
Honeypot attack, port: 445, PTR: dsl-201-138-51-140-dyn.prod-infinitum.com.mx.
2020-02-05 04:50:41
14.248.236.205 attackbots
Feb  4 21:01:58 xxxx sshd[31894]: Address 14.248.236.205 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb  4 21:01:58 xxxx sshd[31894]: Invalid user admin from 14.248.236.205
Feb  4 21:01:58 xxxx sshd[31894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.236.205 
Feb  4 21:02:00 xxxx sshd[31894]: Failed password for invalid user admin from 14.248.236.205 port 47092 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.248.236.205
2020-02-05 04:26:58
159.203.59.38 attackbots
Feb  4 21:33:09 silence02 sshd[23567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.59.38
Feb  4 21:33:11 silence02 sshd[23567]: Failed password for invalid user user from 159.203.59.38 port 54166 ssh2
Feb  4 21:36:21 silence02 sshd[23832]: Failed password for root from 159.203.59.38 port 55280 ssh2
2020-02-05 04:40:10
106.54.64.136 attackbotsspam
Feb  4 17:20:54 ws19vmsma01 sshd[145710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.64.136
Feb  4 17:20:56 ws19vmsma01 sshd[145710]: Failed password for invalid user pablo from 106.54.64.136 port 43502 ssh2
...
2020-02-05 04:39:12
188.17.152.30 attack
Brute force attempt
2020-02-05 04:25:45
122.51.253.156 attackbotsspam
Feb  4 17:20:53 ws22vmsma01 sshd[195679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.253.156
Feb  4 17:20:54 ws22vmsma01 sshd[195679]: Failed password for invalid user contribute from 122.51.253.156 port 41350 ssh2
...
2020-02-05 04:39:42
159.65.19.39 attackbots
Automatic report - XMLRPC Attack
2020-02-05 04:44:40
222.186.42.7 attackbots
02/04/2020-15:52:51.901731 222.186.42.7 Protocol: 6 ET SCAN Potential SSH Scan
2020-02-05 04:54:05
132.157.66.17 attackbotsspam
2019-09-23 14:53:02 1iCNps-0001wU-1U SMTP connection from \(\[132.157.66.17\]\) \[132.157.66.17\]:59691 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-23 14:53:22 1iCNqC-0001x2-Eo SMTP connection from \(\[132.157.66.17\]\) \[132.157.66.17\]:60373 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-23 14:53:31 1iCNqM-0001xC-Oz SMTP connection from \(\[132.157.66.17\]\) \[132.157.66.17\]:60676 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 04:19:40
92.118.37.86 attack
Feb  4 21:46:32 debian-2gb-nbg1-2 kernel: \[3108441.327766\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.86 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=33576 PROTO=TCP SPT=41846 DPT=3874 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-05 04:49:52
122.117.179.59 attackspam
firewall-block, port(s): 23/tcp
2020-02-05 04:33:27
35.197.227.71 attack
Feb  4 15:17:58 NPSTNNYC01T sshd[8896]: Failed password for root from 35.197.227.71 port 48506 ssh2
Feb  4 15:19:28 NPSTNNYC01T sshd[8933]: Failed password for root from 35.197.227.71 port 34616 ssh2
...
2020-02-05 04:32:42
190.15.122.4 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-05 04:52:01
117.221.197.25 attackbotsspam
1580847663 - 02/04/2020 21:21:03 Host: 117.221.197.25/117.221.197.25 Port: 445 TCP Blocked
2020-02-05 04:30:01
106.13.81.162 attackbots
Feb  4 15:46:16 legacy sshd[17874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.162
Feb  4 15:46:18 legacy sshd[17874]: Failed password for invalid user sauter from 106.13.81.162 port 47130 ssh2
Feb  4 15:50:50 legacy sshd[18229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.162
...
2020-02-05 04:21:24

Recently Reported IPs

104.21.13.115 104.21.16.172 104.21.15.125 104.21.17.104
104.21.2.112 104.21.19.75 104.21.2.15 104.21.16.254
104.21.20.221 104.21.20.75 104.21.21.242 104.21.18.15
104.21.20.141 104.21.21.231 104.21.20.230 104.21.22.142
104.21.21.56 104.21.21.96 104.21.22.57 104.21.22.16