Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.19.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48393
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.19.239.			IN	A

;; AUTHORITY SECTION:
.			112	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 08:17:59 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 239.19.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.19.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.227.237.84 attack
Oct 17 14:36:36 icinga sshd[32489]: Failed password for root from 165.227.237.84 port 59180 ssh2
...
2019-10-17 21:52:56
172.105.210.107 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-17 21:58:32
54.39.138.246 attackspambots
Oct 17 13:39:52 tuxlinux sshd[20033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.138.246  user=root
Oct 17 13:39:55 tuxlinux sshd[20033]: Failed password for root from 54.39.138.246 port 41574 ssh2
Oct 17 13:39:52 tuxlinux sshd[20033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.138.246  user=root
Oct 17 13:39:55 tuxlinux sshd[20033]: Failed password for root from 54.39.138.246 port 41574 ssh2
Oct 17 13:44:01 tuxlinux sshd[20088]: Invalid user roland from 54.39.138.246 port 57504
...
2019-10-17 21:51:26
202.91.82.77 attackbotsspam
Automatic report - Port Scan Attack
2019-10-17 21:56:50
119.42.175.200 attackbotsspam
Oct 17 15:42:13 cvbnet sshd[17650]: Failed password for root from 119.42.175.200 port 44115 ssh2
Oct 17 15:47:02 cvbnet sshd[17653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200 
...
2019-10-17 22:17:32
106.13.200.7 attackspam
Invalid user zhanghua from 106.13.200.7 port 44048
2019-10-17 22:05:36
196.0.111.186 attack
(imapd) Failed IMAP login from 196.0.111.186 (UG/Uganda/-): 1 in the last 3600 secs
2019-10-17 22:10:36
69.171.74.150 attackspam
Automatic report - SSH Brute-Force Attack
2019-10-17 21:55:22
117.59.6.58 attack
RDP brute force attack detected by fail2ban
2019-10-17 22:00:05
203.172.161.11 attackspam
SSH Brute-Forcing (ownc)
2019-10-17 21:48:57
165.22.182.183 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-10-17 22:08:38
164.132.44.25 attackspambots
Oct 17 03:44:58 auw2 sshd\[15499\]: Invalid user beach1 from 164.132.44.25
Oct 17 03:44:58 auw2 sshd\[15499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-164-132-44.eu
Oct 17 03:45:00 auw2 sshd\[15499\]: Failed password for invalid user beach1 from 164.132.44.25 port 41818 ssh2
Oct 17 03:49:11 auw2 sshd\[15800\]: Invalid user ftp from 164.132.44.25
Oct 17 03:49:11 auw2 sshd\[15800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-164-132-44.eu
2019-10-17 22:23:24
119.10.114.5 attack
Invalid user hibernate from 119.10.114.5 port 37472
2019-10-17 21:57:14
202.79.169.252 attackspam
DATE:2019-10-17 13:43:11, IP:202.79.169.252, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2019-10-17 22:22:54
2.42.216.10 attack
Fail2Ban Ban Triggered
2019-10-17 21:58:05

Recently Reported IPs

168.68.127.20 141.116.49.107 104.21.19.245 20.145.35.127
104.21.19.28 104.21.19.30 104.21.19.54 104.21.19.6
67.109.22.126 187.64.157.166 104.21.19.88 104.21.2.129
85.191.198.108 104.21.2.130 104.21.2.136 104.21.2.140
104.21.2.148 104.21.2.157 53.204.103.146 104.21.2.162