Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.14.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36293
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.14.141.			IN	A

;; AUTHORITY SECTION:
.			307	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 17:58:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 141.14.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.14.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
110.77.138.39 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 02:55:16,517 INFO [amun_request_handler] PortScan Detected on Port: 445 (110.77.138.39)
2019-07-22 16:22:47
101.224.122.67 attackspambots
Unauthorized connection attempt from IP address 101.224.122.67 on Port 445(SMB)
2019-07-22 17:07:45
51.254.58.226 attack
Jul 22 06:16:00 mail postfix/smtpd\[28594\]: warning: unknown\[51.254.58.226\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 22 06:16:24 mail postfix/smtpd\[23680\]: warning: unknown\[51.254.58.226\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 22 06:16:46 mail postfix/smtpd\[29005\]: warning: unknown\[51.254.58.226\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-22 17:05:28
203.183.40.240 attackspam
Jul 22 10:30:01 nextcloud sshd\[25061\]: Invalid user ftb from 203.183.40.240
Jul 22 10:30:01 nextcloud sshd\[25061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.183.40.240
Jul 22 10:30:02 nextcloud sshd\[25061\]: Failed password for invalid user ftb from 203.183.40.240 port 37548 ssh2
...
2019-07-22 16:33:22
104.248.191.159 attackbotsspam
2019-07-22T09:47:52.513060cavecanem sshd[19110]: Invalid user student1 from 104.248.191.159 port 56064
2019-07-22T09:47:52.515629cavecanem sshd[19110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.191.159
2019-07-22T09:47:52.513060cavecanem sshd[19110]: Invalid user student1 from 104.248.191.159 port 56064
2019-07-22T09:47:54.208261cavecanem sshd[19110]: Failed password for invalid user student1 from 104.248.191.159 port 56064 ssh2
2019-07-22T09:52:16.356764cavecanem sshd[24839]: Invalid user big from 104.248.191.159 port 51118
2019-07-22T09:52:16.359099cavecanem sshd[24839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.191.159
2019-07-22T09:52:16.356764cavecanem sshd[24839]: Invalid user big from 104.248.191.159 port 51118
2019-07-22T09:52:18.628278cavecanem sshd[24839]: Failed password for invalid user big from 104.248.191.159 port 51118 ssh2
2019-07-22T09:56:36.284252cavecanem sshd[
...
2019-07-22 16:23:53
222.174.251.202 attackbots
[SMB remote code execution attempt: port tcp/445]
[scan/connect: 3 time(s)]
*(RWIN=8192)(07221037)
2019-07-22 16:46:56
165.227.209.96 attack
Jul 22 10:46:39 OPSO sshd\[22166\]: Invalid user cliente from 165.227.209.96 port 55468
Jul 22 10:46:39 OPSO sshd\[22166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.209.96
Jul 22 10:46:41 OPSO sshd\[22166\]: Failed password for invalid user cliente from 165.227.209.96 port 55468 ssh2
Jul 22 10:52:20 OPSO sshd\[22911\]: Invalid user anonymous from 165.227.209.96 port 51376
Jul 22 10:52:20 OPSO sshd\[22911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.209.96
2019-07-22 16:58:32
37.49.225.181 attackspam
Jul 22 05:45:25 mail postfix/smtpd\[20349\]: warning: unknown\[37.49.225.181\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 22 05:45:31 mail postfix/smtpd\[23332\]: warning: unknown\[37.49.225.181\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 22 05:45:41 mail postfix/smtpd\[23676\]: warning: unknown\[37.49.225.181\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-22 17:06:19
123.25.117.74 attackbots
Unauthorized connection attempt from IP address 123.25.117.74 on Port 445(SMB)
2019-07-22 16:30:37
151.252.108.128 attack
Unauthorized connection attempt from IP address 151.252.108.128 on Port 445(SMB)
2019-07-22 16:41:51
109.94.69.123 attackspam
[portscan] Port scan
2019-07-22 16:43:08
147.75.127.122 attack
Unauthorized connection attempt from IP address 147.75.127.122 on Port 445(SMB)
2019-07-22 16:48:03
201.38.219.136 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 12:20:37,716 INFO [shellcode_manager] (201.38.219.136) no match, writing hexdump (ae2e78d9309a8f28c279f4ae23a8ed75 :2459835) - MS17010 (EternalBlue)
2019-07-22 16:28:22
221.4.163.82 attackbotsspam
3389BruteforceFW21
2019-07-22 16:53:43
113.160.186.48 attackbotsspam
Unauthorized connection attempt from IP address 113.160.186.48 on Port 445(SMB)
2019-07-22 16:29:17

Recently Reported IPs

104.21.14.14 104.21.14.143 104.21.14.145 104.21.14.147
104.21.14.149 104.21.14.151 104.21.14.152 104.21.14.154
104.21.14.158 88.23.9.41 104.21.14.159 231.193.169.175
104.21.14.160 104.21.14.161 104.21.14.164 104.21.14.166
87.186.71.84 104.21.14.167 104.21.14.168 104.21.14.169