Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.23.233 spam
https://www.projecthoneypot.org/ip_104.21.23.233
https://multirbl.valli.org/lookup/104.21.23.233.html
https://cleantalk.org/blacklists/104.21.23.233#anc140146
2022-12-29 00:19:00
104.21.23.233 spam
https://www.projecthoneypot.org/ip_104.21.23.233
https://multirbl.valli.org/lookup/104.21.23.233.html
https://cleantalk.org/blacklists/104.21.23.233#anc140146
2022-12-29 00:13:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.2.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.2.49.			IN	A

;; AUTHORITY SECTION:
.			175	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:14:55 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 49.2.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.2.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.187.200.207 attack
Jun 26 23:19:32 fhem-rasp sshd[19824]: Invalid user asif from 52.187.200.207 port 45310
...
2020-06-27 05:31:30
186.235.63.115 attackspam
Invalid user ego from 186.235.63.115 port 42118
2020-06-27 05:57:06
192.254.104.112 attack
Port 22 Scan, PTR: None
2020-06-27 05:51:45
118.194.51.162 attack
Port Scan detected!
...
2020-06-27 05:37:08
111.229.49.165 attackbotsspam
Jun 26 22:53:05 piServer sshd[31231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.49.165 
Jun 26 22:53:07 piServer sshd[31231]: Failed password for invalid user sms from 111.229.49.165 port 42980 ssh2
Jun 26 22:55:59 piServer sshd[31586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.49.165 
...
2020-06-27 05:55:39
139.99.43.235 attack
*Port Scan* detected from 139.99.43.235 (SG/Singapore/-/Singapore (Downtown Core)/235.ip-139-99-43.eu). 4 hits in the last 85 seconds
2020-06-27 05:46:53
222.186.180.223 attack
Jun 27 00:00:15 * sshd[3465]: Failed password for root from 222.186.180.223 port 59424 ssh2
Jun 27 00:00:27 * sshd[3465]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 59424 ssh2 [preauth]
2020-06-27 06:07:24
144.172.73.37 attackbotsspam
[ssh] SSH attack
2020-06-27 05:41:59
80.232.183.230 attackbots
Invalid user eddie from 80.232.183.230 port 55574
2020-06-27 05:59:16
220.248.101.54 attack
Jun 26 14:21:06 dignus sshd[28777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.101.54
Jun 26 14:21:08 dignus sshd[28777]: Failed password for invalid user zack from 220.248.101.54 port 8488 ssh2
Jun 26 14:24:25 dignus sshd[29099]: Invalid user darwin from 220.248.101.54 port 41037
Jun 26 14:24:25 dignus sshd[29099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.101.54
Jun 26 14:24:27 dignus sshd[29099]: Failed password for invalid user darwin from 220.248.101.54 port 41037 ssh2
...
2020-06-27 05:29:15
62.60.135.237 attackbots
Jun 26 16:07:26 NPSTNNYC01T sshd[26418]: Failed password for root from 62.60.135.237 port 47454 ssh2
Jun 26 16:11:30 NPSTNNYC01T sshd[26656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.60.135.237
Jun 26 16:11:32 NPSTNNYC01T sshd[26656]: Failed password for invalid user peng from 62.60.135.237 port 47206 ssh2
...
2020-06-27 05:33:34
194.213.43.102 attackbotsspam
Jun 26 22:12:08 dev0-dcde-rnet sshd[13474]: Failed password for root from 194.213.43.102 port 27012 ssh2
Jun 26 22:20:34 dev0-dcde-rnet sshd[13561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.213.43.102
Jun 26 22:20:37 dev0-dcde-rnet sshd[13561]: Failed password for invalid user prince from 194.213.43.102 port 23202 ssh2
2020-06-27 05:38:00
60.167.180.193 attackspam
Invalid user join from 60.167.180.193 port 37296
2020-06-27 05:34:05
188.254.0.112 attackspambots
Jun 27 00:21:43 pkdns2 sshd\[18393\]: Invalid user support from 188.254.0.112Jun 27 00:21:45 pkdns2 sshd\[18393\]: Failed password for invalid user support from 188.254.0.112 port 48010 ssh2Jun 27 00:26:28 pkdns2 sshd\[18631\]: Invalid user vvn from 188.254.0.112Jun 27 00:26:29 pkdns2 sshd\[18631\]: Failed password for invalid user vvn from 188.254.0.112 port 45952 ssh2Jun 27 00:31:00 pkdns2 sshd\[18841\]: Invalid user asteriskuser from 188.254.0.112Jun 27 00:31:02 pkdns2 sshd\[18841\]: Failed password for invalid user asteriskuser from 188.254.0.112 port 43878 ssh2
...
2020-06-27 05:40:39
192.241.231.54 attackbots
*Port Scan* detected from 192.241.231.54 (US/United States/California/San Francisco/zg-0624a-48.stretchoid.com). 4 hits in the last 255 seconds
2020-06-27 05:38:33

Recently Reported IPs

104.21.2.4 104.21.2.48 104.21.2.42 104.21.2.38
104.21.68.13 104.21.2.6 104.21.2.47 104.21.2.52
104.21.2.50 104.21.2.60 104.21.2.71 104.21.2.74
104.21.68.130 104.21.2.72 104.21.2.65 104.21.2.88
104.21.2.78 104.21.2.87 104.21.2.86 104.21.2.63