Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.14.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8956
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.14.242.			IN	A

;; AUTHORITY SECTION:
.			348	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:11:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 242.14.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.14.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.186.233.255 attackbots
20/3/23@02:37:46: FAIL: Alarm-Network address from=95.186.233.255
...
2020-03-23 15:08:18
190.193.37.83 attackspam
SSH brutforce
2020-03-23 14:56:49
184.0.149.162 attack
Mar 23 07:23:40 ovpn sshd\[14874\]: Invalid user test from 184.0.149.162
Mar 23 07:23:40 ovpn sshd\[14874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.0.149.162
Mar 23 07:23:42 ovpn sshd\[14874\]: Failed password for invalid user test from 184.0.149.162 port 53410 ssh2
Mar 23 07:37:37 ovpn sshd\[18171\]: Invalid user pb from 184.0.149.162
Mar 23 07:37:37 ovpn sshd\[18171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.0.149.162
2020-03-23 15:18:38
51.91.79.232 attackbots
2020-03-23T07:34:30.867994struts4.enskede.local sshd\[18659\]: Invalid user sm from 51.91.79.232 port 48518
2020-03-23T07:34:30.877332struts4.enskede.local sshd\[18659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.ip-51-91-79.eu
2020-03-23T07:34:34.059851struts4.enskede.local sshd\[18659\]: Failed password for invalid user sm from 51.91.79.232 port 48518 ssh2
2020-03-23T07:38:32.532499struts4.enskede.local sshd\[18774\]: Invalid user halflife from 51.91.79.232 port 36788
2020-03-23T07:38:32.541026struts4.enskede.local sshd\[18774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.ip-51-91-79.eu
...
2020-03-23 14:51:44
189.15.51.54 attackspambots
Automatic report - Port Scan Attack
2020-03-23 15:12:14
106.12.142.52 attack
Mar 23 06:37:08 ks10 sshd[156555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.142.52 
Mar 23 06:37:10 ks10 sshd[156555]: Failed password for invalid user ts5 from 106.12.142.52 port 52144 ssh2
...
2020-03-23 14:37:40
185.244.39.177 attackspam
20/3/23@02:50:51: FAIL: Alarm-SSH address from=185.244.39.177
...
2020-03-23 14:51:14
74.105.59.144 attack
Honeypot attack, port: 445, PTR: static-74-105-59-144.nwrknj.fios.verizon.net.
2020-03-23 14:44:16
45.170.220.66 attack
DATE:2020-03-23 07:34:27, IP:45.170.220.66, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-03-23 14:45:21
116.12.251.135 attack
Mar 23 07:33:13 host01 sshd[21419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.251.135 
Mar 23 07:33:15 host01 sshd[21419]: Failed password for invalid user handsdata from 116.12.251.135 port 44766 ssh2
Mar 23 07:38:11 host01 sshd[22205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.251.135 
...
2020-03-23 14:42:17
112.26.44.112 attack
Mar 23 06:37:59 work-partkepr sshd\[4792\]: Invalid user test from 112.26.44.112 port 50313
Mar 23 06:37:59 work-partkepr sshd\[4792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.26.44.112
...
2020-03-23 14:57:39
159.192.98.3 attack
Mar 23 03:37:53 vps46666688 sshd[23684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.98.3
Mar 23 03:37:55 vps46666688 sshd[23684]: Failed password for invalid user cod from 159.192.98.3 port 34548 ssh2
...
2020-03-23 14:58:54
183.82.36.44 attackspam
Mar 23 07:58:44 SilenceServices sshd[15003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.36.44
Mar 23 07:58:47 SilenceServices sshd[15003]: Failed password for invalid user maura from 183.82.36.44 port 39138 ssh2
Mar 23 08:02:50 SilenceServices sshd[23664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.36.44
2020-03-23 15:15:55
202.109.202.60 attackbots
Mar 23 07:26:39 roki sshd[25755]: Invalid user af from 202.109.202.60
Mar 23 07:26:39 roki sshd[25755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.109.202.60
Mar 23 07:26:41 roki sshd[25755]: Failed password for invalid user af from 202.109.202.60 port 52206 ssh2
Mar 23 07:37:54 roki sshd[26751]: Invalid user asha from 202.109.202.60
Mar 23 07:37:54 roki sshd[26751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.109.202.60
...
2020-03-23 14:56:29
206.189.239.103 attack
SSH Login Bruteforce
2020-03-23 14:43:18

Recently Reported IPs

104.21.14.36 104.21.14.39 104.21.14.247 104.21.67.252
104.21.14.249 104.21.14.244 104.21.14.253 104.21.14.34
104.21.14.241 104.21.14.40 104.21.14.47 104.21.67.29
104.21.14.55 104.21.14.64 104.21.14.65 104.21.14.63
104.21.14.70 104.21.14.5 104.21.14.71 104.21.14.59