Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.16.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60095
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.16.34.			IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 18:14:47 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 34.16.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.16.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.138.148.103 attackbotsspam
badbot
2019-11-27 06:34:19
167.114.43.87 attack
Looking for resource vulnerabilities
2019-11-27 06:45:27
45.55.155.224 attackbots
Nov 26 14:24:10 vtv3 sshd[16661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.224 
Nov 26 14:24:12 vtv3 sshd[16661]: Failed password for invalid user default from 45.55.155.224 port 58393 ssh2
Nov 26 14:30:10 vtv3 sshd[19814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.224 
Nov 26 14:43:02 vtv3 sshd[26068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.224 
Nov 26 14:43:04 vtv3 sshd[26068]: Failed password for invalid user fanty from 45.55.155.224 port 55829 ssh2
Nov 26 14:49:04 vtv3 sshd[28744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.224 
Nov 26 15:01:04 vtv3 sshd[2296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.224 
Nov 26 15:01:06 vtv3 sshd[2296]: Failed password for invalid user ikehara from 45.55.155.224 port 53313 ssh2
Nov 26 15:07:
2019-11-27 06:32:04
137.74.115.225 attackbotsspam
2019-11-26T16:42:09.176057abusebot-4.cloudsearch.cf sshd\[22136\]: Invalid user \~!@\#\$% from 137.74.115.225 port 34206
2019-11-27 06:35:10
196.38.70.24 attackspam
Invalid user server from 196.38.70.24 port 62461
2019-11-27 06:08:38
66.249.155.244 attackbotsspam
$f2bV_matches
2019-11-27 06:26:37
211.72.92.140 attackspambots
" "
2019-11-27 06:11:01
192.144.142.72 attack
$f2bV_matches
2019-11-27 06:44:56
41.39.171.24 attackbots
Nov 26 15:33:12 xeon cyrus/imap[60680]: badlogin: host-41.39.171.24.tedata.net [41.39.171.24] plain [SASL(-13): authentication failure: Password verification failed]
2019-11-27 06:07:59
159.138.155.247 attackspam
badbot
2019-11-27 06:10:04
106.12.177.51 attackspam
Nov 26 12:55:44 linuxvps sshd\[5285\]: Invalid user dnsmasq from 106.12.177.51
Nov 26 12:55:44 linuxvps sshd\[5285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.177.51
Nov 26 12:55:46 linuxvps sshd\[5285\]: Failed password for invalid user dnsmasq from 106.12.177.51 port 58186 ssh2
Nov 26 12:59:28 linuxvps sshd\[7496\]: Invalid user rpm from 106.12.177.51
Nov 26 12:59:28 linuxvps sshd\[7496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.177.51
2019-11-27 06:41:35
168.63.250.137 attackspambots
rdp brute-force attack (aggressivity: medium)
2019-11-27 06:34:45
1.183.118.156 attackspambots
port scan and connect, tcp 23 (telnet)
2019-11-27 06:10:37
150.223.31.248 attackbotsspam
$f2bV_matches
2019-11-27 06:21:24
217.69.143.217 attack
404 NOT FOUND
2019-11-27 06:30:00

Recently Reported IPs

104.21.16.3 253.104.190.183 104.21.16.35 104.21.16.37
31.240.45.242 104.21.16.39 104.21.16.4 0.69.16.215
183.6.101.154 104.21.16.40 104.21.16.41 104.21.16.43
104.21.16.45 238.19.150.46 104.21.16.46 104.21.16.5
104.21.16.54 104.21.16.59 104.21.16.61 104.21.16.62