Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.23.233 spam
https://www.projecthoneypot.org/ip_104.21.23.233
https://multirbl.valli.org/lookup/104.21.23.233.html
https://cleantalk.org/blacklists/104.21.23.233#anc140146
2022-12-29 00:19:00
104.21.23.233 spam
https://www.projecthoneypot.org/ip_104.21.23.233
https://multirbl.valli.org/lookup/104.21.23.233.html
https://cleantalk.org/blacklists/104.21.23.233#anc140146
2022-12-29 00:13:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.2.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.2.252.			IN	A

;; AUTHORITY SECTION:
.			343	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 18:42:31 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 252.2.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.2.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.114.102.38 attack
srv02 DDoS Malware Target(80:http) ..
2020-10-06 18:24:13
119.45.26.117 attack
Oct  6 09:36:44 vpn01 sshd[22897]: Failed password for root from 119.45.26.117 port 39268 ssh2
...
2020-10-06 18:19:19
118.200.72.240 attackspambots
23/tcp
[2020-10-05]1pkt
2020-10-06 18:40:27
192.141.245.39 attackspambots
445/tcp
[2020-10-05]1pkt
2020-10-06 18:30:40
123.157.112.49 attackbotsspam
23/tcp
[2020-10-05]1pkt
2020-10-06 18:14:08
104.168.14.36 attackbots
Found on   Blocklist de     / proto=6  .  srcport=42398  .  dstport=22 SSH  .     (991)
2020-10-06 18:34:54
42.235.90.55 attackspambots
23/tcp
[2020-10-05]1pkt
2020-10-06 18:42:56
72.10.31.242 attackspam
22/tcp
[2020-10-05]1pkt
2020-10-06 18:20:41
167.248.133.16 attack
Found on   CINS badguys     / proto=6  .  srcport=36044  .  dstport=8080  .     (567)
2020-10-06 18:18:28
107.181.228.250 attack
 TCP (SYN) 107.181.228.250:1259 -> port 1433, len 52
2020-10-06 18:17:20
192.3.182.226 attack
Unauthorized connection attempt from IP address 192.3.182.226 on Port 445(SMB)
2020-10-06 18:25:14
150.116.220.251 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-06 18:45:33
182.121.135.10 attackbots
23/tcp
[2020-10-05]1pkt
2020-10-06 18:11:27
140.246.136.72 attackspambots
RDP Brute-Force (Grieskirchen RZ2)
2020-10-06 18:30:14
184.154.139.21 attack
(From 1) 1
2020-10-06 18:47:41

Recently Reported IPs

104.21.2.251 104.21.2.254 104.21.2.26 104.21.2.28
104.21.2.29 89.209.241.208 104.21.2.33 104.21.2.35
104.21.2.36 104.21.2.37 73.249.41.162 104.21.2.39
104.21.2.43 104.21.2.5 104.21.2.53 104.21.2.54
167.67.241.104 104.21.2.55 104.21.2.56 104.21.2.57