Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.14.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.14.105.			IN	A

;; AUTHORITY SECTION:
.			410	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:11:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 105.14.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.14.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.254.77.120 attackbotsspam
445/tcp
[2019-06-25]1pkt
2019-06-26 08:32:49
69.135.100.82 attack
Jun 26 01:39:33 * sshd[30334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.135.100.82
Jun 26 01:39:35 * sshd[30334]: Failed password for invalid user teamspeak from 69.135.100.82 port 36256 ssh2
2019-06-26 08:38:55
177.74.239.69 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-25 21:21:52,333 INFO [amun_request_handler] PortScan Detected on Port: 445 (177.74.239.69)
2019-06-26 08:25:17
42.104.126.116 attackbotsspam
www noscript
...
2019-06-26 08:49:50
202.125.19.103 attackspambots
Unauthorised access (Jun 25) SRC=202.125.19.103 LEN=44 TTL=48 ID=4518 TCP DPT=23 WINDOW=48248 SYN
2019-06-26 08:51:15
2.91.224.21 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-06-26 08:55:36
115.74.216.117 attack
Unauthorized connection attempt from IP address 115.74.216.117 on Port 445(SMB)
2019-06-26 08:27:32
106.51.76.223 attackspam
www noscript
...
2019-06-26 08:54:33
85.132.4.134 attackbotsspam
445/tcp
[2019-06-25]1pkt
2019-06-26 08:26:09
35.233.104.145 attack
8883/tcp
[2019-06-25]1pkt
2019-06-26 08:43:40
190.114.240.50 attack
port scan and connect, tcp 5984 (couchdb)
2019-06-26 08:40:52
131.0.63.50 attackspambots
19/6/25@13:09:46: FAIL: Alarm-Intrusion address from=131.0.63.50
...
2019-06-26 09:02:51
190.128.159.118 attackspambots
Jun 25 17:10:51 unicornsoft sshd\[16783\]: Invalid user student from 190.128.159.118
Jun 25 17:10:51 unicornsoft sshd\[16783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.159.118
Jun 25 17:10:53 unicornsoft sshd\[16783\]: Failed password for invalid user student from 190.128.159.118 port 47524 ssh2
2019-06-26 08:26:39
106.13.54.212 attack
Jun 25 19:55:34 dedicated sshd[30401]: Invalid user admin from 106.13.54.212 port 43270
2019-06-26 08:18:45
109.165.233.4 attackspambots
445/tcp
[2019-06-25]1pkt
2019-06-26 08:53:08

Recently Reported IPs

104.21.67.233 104.21.14.10 104.21.14.108 104.21.14.116
104.21.14.121 104.21.14.113 104.21.14.107 104.21.14.118
104.21.14.125 104.21.13.98 104.21.14.124 104.21.14.115
104.21.67.237 104.21.14.140 104.21.14.131 104.21.14.133
104.21.14.134 104.21.14.132 104.21.14.156 104.21.14.139