Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.23.233 spam
https://www.projecthoneypot.org/ip_104.21.23.233
https://multirbl.valli.org/lookup/104.21.23.233.html
https://cleantalk.org/blacklists/104.21.23.233#anc140146
2022-12-29 00:19:00
104.21.23.233 spam
https://www.projecthoneypot.org/ip_104.21.23.233
https://multirbl.valli.org/lookup/104.21.23.233.html
https://cleantalk.org/blacklists/104.21.23.233#anc140146
2022-12-29 00:13:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.2.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.2.53.			IN	A

;; AUTHORITY SECTION:
.			237	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 18:43:23 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 53.2.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.2.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.91.79.21 attackbotsspam
Brute-force attempt banned
2020-04-22 19:29:24
209.17.96.82 attackbots
DDOS attempt blocked
2020-04-22 19:45:04
180.101.248.148 attack
Apr 22 06:49:21 vpn01 sshd[3082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.248.148
Apr 22 06:49:23 vpn01 sshd[3082]: Failed password for invalid user iq from 180.101.248.148 port 35266 ssh2
...
2020-04-22 19:31:55
51.178.50.244 attack
Apr 22 11:43:24 l03 sshd[19280]: Invalid user test3 from 51.178.50.244 port 49464
...
2020-04-22 19:44:11
45.63.104.211 attackspambots
$f2bV_matches
2020-04-22 19:35:54
58.87.114.13 attackbotsspam
$f2bV_matches
2020-04-22 19:42:53
36.90.15.186 attack
36.90.15.186 - - [22/Apr/2020:05:47:24 +0200] "POST /wp-login.php HTTP/1.1" 200 6458 "http://entreprendre.univ-lyon3.fr/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
36.90.15.186 - - [22/Apr/2020:05:47:29 +0200] "POST /wp-login.php HTTP/1.1" 200 6458 "http://entreprendre.univ-lyon3.fr/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
36.90.15.186 - - [22/Apr/2020:05:47:33 +0200] "POST /wp-login.php HTTP/1.1" 200 6458 "http://entreprendre.univ-lyon3.fr/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
36.90.15.186 - - [22/Apr/2020:05:47:36 +0200] "POST /wp-login.php HTTP/1.1" 200 6458 "http://entreprendre.univ-lyon3.fr/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
36.90.15.186 - - [22/Apr/2020:05:47:39 +0200] "POST /wp-login.php HTTP/1.1" 200 6458 "http://entreprendre.univ-lyon3.fr/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; 
...
2020-04-22 19:24:41
157.230.48.124 attackspambots
SSH login attempts.
2020-04-22 19:21:58
66.70.130.151 attackspambots
Apr 22 13:01:39 v22018086721571380 sshd[27509]: Failed password for invalid user rd from 66.70.130.151 port 48808 ssh2
2020-04-22 19:30:42
101.51.144.235 attack
Automatic report - SSH Brute-Force Attack
2020-04-22 19:34:12
95.156.116.198 attackspam
Unauthorized connection attempt from IP address 95.156.116.198 on Port 445(SMB)
2020-04-22 19:21:10
194.5.188.154 attackbots
Apr 20 23:48:51 colin sshd[27238]: Failed password for r.r from 194.5.188.154 port 60039 ssh2
Apr 20 23:50:16 colin sshd[27301]: Invalid user qf from 194.5.188.154
Apr 20 23:50:18 colin sshd[27301]: Failed password for invalid user qf from 194.5.188.154 port 38183 ssh2
Apr 20 23:51:51 colin sshd[27355]: Failed password for r.r from 194.5.188.154 port 44568 ssh2
Apr 20 23:53:09 colin sshd[27428]: Failed password for r.r from 194.5.188.154 port 50943 ssh2
Apr 20 23:54:29 colin sshd[27516]: Invalid user sn from 194.5.188.154


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=194.5.188.154
2020-04-22 19:30:25
24.6.59.51 attack
odoo8
...
2020-04-22 19:43:18
77.243.218.63 attack
Apr 22 12:44:31 ns382633 sshd\[11482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.243.218.63  user=root
Apr 22 12:44:33 ns382633 sshd\[11482\]: Failed password for root from 77.243.218.63 port 45336 ssh2
Apr 22 12:47:30 ns382633 sshd\[12220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.243.218.63  user=root
Apr 22 12:47:32 ns382633 sshd\[12220\]: Failed password for root from 77.243.218.63 port 53833 ssh2
Apr 22 12:48:03 ns382633 sshd\[12311\]: Invalid user test1 from 77.243.218.63 port 56739
Apr 22 12:48:03 ns382633 sshd\[12311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.243.218.63
2020-04-22 19:49:08
212.92.116.246 attackspam
RDP Bruteforce
2020-04-22 19:15:30

Recently Reported IPs

104.21.2.5 104.21.2.54 167.67.241.104 104.21.2.55
104.21.2.56 104.21.2.57 200.46.118.93 69.54.97.222
104.21.2.58 104.21.2.62 163.126.177.89 104.21.2.66
87.90.52.161 104.21.2.68 104.21.2.69 46.132.117.116
104.21.2.70 104.21.2.73 104.21.2.79 104.21.2.8