Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.14.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33122
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.14.112.			IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 17:57:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 112.14.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.14.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
87.252.243.210 attackbotsspam
Aug 10 05:40:46 vps647732 sshd[28628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.252.243.210
Aug 10 05:40:49 vps647732 sshd[28628]: Failed password for invalid user asa from 87.252.243.210 port 51324 ssh2
...
2019-08-10 11:41:55
167.179.76.246 attackspam
10.08.2019 03:29:10 Recursive DNS scan
2019-08-10 11:53:57
23.129.64.162 attackbotsspam
C1,WP GET /nelson/wp-login.php
2019-08-10 12:03:34
149.56.254.40 attackspam
[ ?? ] From rbnf-kl46-eduardo=impactosistemas.com.br@hadaziu.com.br Fri Aug 09 23:44:47 2019
 Received: from elenin-105.reverseonweb.we.bs ([149.56.254.40]:60721)
2019-08-10 11:59:10
138.68.12.43 attackbotsspam
Aug  9 23:15:06 xtremcommunity sshd\[14390\]: Invalid user 1234 from 138.68.12.43 port 54836
Aug  9 23:15:06 xtremcommunity sshd\[14390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.12.43
Aug  9 23:15:09 xtremcommunity sshd\[14390\]: Failed password for invalid user 1234 from 138.68.12.43 port 54836 ssh2
Aug  9 23:21:18 xtremcommunity sshd\[14603\]: Invalid user erick from 138.68.12.43 port 48470
Aug  9 23:21:18 xtremcommunity sshd\[14603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.12.43
...
2019-08-10 12:00:43
118.42.125.170 attackbotsspam
Aug 10 05:26:35 SilenceServices sshd[14093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.42.125.170
Aug 10 05:26:38 SilenceServices sshd[14093]: Failed password for invalid user postgres from 118.42.125.170 port 60900 ssh2
Aug 10 05:31:41 SilenceServices sshd[17508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.42.125.170
2019-08-10 11:33:54
59.1.48.98 attackbots
Aug  9 23:21:11 xtremcommunity sshd\[14589\]: Invalid user king from 59.1.48.98 port 27004
Aug  9 23:21:11 xtremcommunity sshd\[14589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.1.48.98
Aug  9 23:21:13 xtremcommunity sshd\[14589\]: Failed password for invalid user king from 59.1.48.98 port 27004 ssh2
Aug  9 23:25:58 xtremcommunity sshd\[14748\]: Invalid user gaurav from 59.1.48.98 port 51261
Aug  9 23:25:58 xtremcommunity sshd\[14748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.1.48.98
...
2019-08-10 11:35:25
88.99.168.195 attack
Automatic report - Banned IP Access
2019-08-10 11:20:06
149.202.88.21 attackbots
Aug  9 22:41:38 aat-srv002 sshd[27620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.88.21
Aug  9 22:41:39 aat-srv002 sshd[27620]: Failed password for invalid user pi from 149.202.88.21 port 39404 ssh2
Aug  9 22:45:51 aat-srv002 sshd[27690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.88.21
Aug  9 22:45:53 aat-srv002 sshd[27690]: Failed password for invalid user tk from 149.202.88.21 port 33378 ssh2
...
2019-08-10 11:57:34
218.92.0.204 attack
Aug 10 05:02:28 mail sshd\[17245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
Aug 10 05:02:30 mail sshd\[17245\]: Failed password for root from 218.92.0.204 port 27945 ssh2
Aug 10 05:02:31 mail sshd\[17245\]: Failed password for root from 218.92.0.204 port 27945 ssh2
Aug 10 05:02:34 mail sshd\[17245\]: Failed password for root from 218.92.0.204 port 27945 ssh2
Aug 10 05:11:44 mail sshd\[18185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2019-08-10 11:13:06
130.185.250.76 attack
Automatic report - Banned IP Access
2019-08-10 11:12:43
142.44.170.101 attackbots
Constant spam! - being sent from this reckless ISP OVH!. Domain name used here is tony@sasheal.info
2019-08-10 11:21:23
195.176.3.24 attackbots
Automatic report - Banned IP Access
2019-08-10 11:19:09
169.197.108.42 attackbots
none
2019-08-10 11:50:42
178.88.115.126 attackspam
Aug 10 05:09:08 MK-Soft-Root1 sshd\[28658\]: Invalid user kerry from 178.88.115.126 port 42968
Aug 10 05:09:08 MK-Soft-Root1 sshd\[28658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.115.126
Aug 10 05:09:10 MK-Soft-Root1 sshd\[28658\]: Failed password for invalid user kerry from 178.88.115.126 port 42968 ssh2
...
2019-08-10 11:20:54

Recently Reported IPs

104.21.14.110 104.21.14.114 104.21.14.117 104.21.14.119
104.21.14.12 104.21.14.123 119.131.126.69 104.21.14.128
214.100.131.39 104.21.14.129 104.21.14.13 104.21.14.138
117.104.5.13 104.21.14.14 104.21.14.141 104.21.14.143
104.21.14.145 104.21.14.147 104.21.14.149 104.21.14.151