Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.19.223
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.19.223.			IN	A

;; AUTHORITY SECTION:
.			214	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 173 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:14:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 223.19.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 223.19.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
31.187.0.153 attackspam
1599843280 - 09/11/2020 18:54:40 Host: 31.187.0.153/31.187.0.153 Port: 445 TCP Blocked
2020-09-12 15:26:34
167.71.134.241 attack
167.71.134.241 (GB/United Kingdom/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 12 02:10:44 jbs1 sshd[12004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
Sep 12 02:09:48 jbs1 sshd[11544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.188.72  user=root
Sep 12 02:09:49 jbs1 sshd[11544]: Failed password for root from 111.229.188.72 port 44952 ssh2
Sep 12 02:08:53 jbs1 sshd[11215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.134.241  user=root
Sep 12 02:08:55 jbs1 sshd[11215]: Failed password for root from 167.71.134.241 port 58810 ssh2
Sep 12 02:10:42 jbs1 sshd[11994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.132.179  user=root

IP Addresses Blocked:

218.92.0.247 (CN/China/-)
111.229.188.72 (CN/China/-)
2020-09-12 15:04:02
182.61.2.238 attackspambots
Sep 12 08:53:49 [host] sshd[820]: pam_unix(sshd:au
Sep 12 08:53:51 [host] sshd[820]: Failed password 
Sep 12 08:58:41 [host] sshd[975]: Invalid user pay
2020-09-12 15:40:38
145.239.19.186 attackbots
Sep 12 04:41:01 ws26vmsma01 sshd[31705]: Failed password for root from 145.239.19.186 port 60812 ssh2
...
2020-09-12 15:02:28
92.223.89.147 attackbotsspam
0,98-02/11 [bc01/m06] PostRequest-Spammer scoring: luanda01
2020-09-12 15:27:59
180.166.141.58 attackbots
Port scan denied
2020-09-12 15:25:11
202.166.164.126 attackspambots
Icarus honeypot on github
2020-09-12 15:40:23
165.22.227.121 attack
Port 22 Scan, PTR: None
2020-09-12 15:37:10
142.93.66.165 attack
142.93.66.165 - - [11/Sep/2020:23:30:54 +0100] "POST /wp-login.php HTTP/1.1" 200 1874 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.66.165 - - [11/Sep/2020:23:30:55 +0100] "POST /wp-login.php HTTP/1.1" 200 1858 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.66.165 - - [11/Sep/2020:23:30:56 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-12 15:26:12
106.13.144.207 attackspam
Sep 12 07:55:20 dhoomketu sshd[3026535]: Failed password for root from 106.13.144.207 port 52194 ssh2
Sep 12 07:56:28 dhoomketu sshd[3026551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.207  user=root
Sep 12 07:56:30 dhoomketu sshd[3026551]: Failed password for root from 106.13.144.207 port 38840 ssh2
Sep 12 07:57:35 dhoomketu sshd[3026589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.207  user=root
Sep 12 07:57:37 dhoomketu sshd[3026589]: Failed password for root from 106.13.144.207 port 53720 ssh2
...
2020-09-12 15:28:29
167.99.224.27 attackspambots
$f2bV_matches
2020-09-12 15:33:11
54.37.14.3 attackspam
Sep 12 06:15:54 scw-6657dc sshd[29088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.14.3
Sep 12 06:15:54 scw-6657dc sshd[29088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.14.3
Sep 12 06:15:56 scw-6657dc sshd[29088]: Failed password for invalid user ftpuser from 54.37.14.3 port 51966 ssh2
...
2020-09-12 15:05:31
122.51.176.55 attackspam
122.51.176.55 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 12 00:27:04 server2 sshd[12417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.201.61.189  user=root
Sep 12 00:27:05 server2 sshd[12417]: Failed password for root from 121.201.61.189 port 52073 ssh2
Sep 12 00:36:47 server2 sshd[23582]: Failed password for root from 122.51.176.55 port 35242 ssh2
Sep 12 00:27:09 server2 sshd[12685]: Failed password for root from 51.254.38.106 port 37424 ssh2
Sep 12 00:39:11 server2 sshd[26893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254  user=root
Sep 12 00:36:45 server2 sshd[23582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.176.55  user=root

IP Addresses Blocked:

121.201.61.189 (CN/China/-)
2020-09-12 15:08:20
64.30.126.33 attackspambots
Automatic report - Port Scan Attack
2020-09-12 15:14:39
142.93.101.148 attack
(sshd) Failed SSH login from 142.93.101.148 (DE/Germany/-): 5 in the last 3600 secs
2020-09-12 15:43:02

Recently Reported IPs

104.21.19.220 104.21.19.205 104.21.19.224 104.21.19.233
104.21.19.235 104.21.19.238 104.21.19.228 104.21.19.244
104.21.19.237 104.21.19.25 104.21.19.252 104.21.19.251
104.21.68.116 104.21.19.243 104.21.19.3 104.21.19.33
104.21.19.35 104.21.19.34 104.21.19.4 104.21.19.37