Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.20.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.20.127.			IN	A

;; AUTHORITY SECTION:
.			129	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:15:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 127.20.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 127.20.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.51.166.84 attackbots
prod8
...
2020-09-05 22:27:36
149.129.52.21 attackbots
149.129.52.21 - - [05/Sep/2020:15:43:35 +0200] "GET /wp-login.php HTTP/1.1" 200 8712 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.129.52.21 - - [05/Sep/2020:15:43:38 +0200] "POST /wp-login.php HTTP/1.1" 200 8942 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.129.52.21 - - [05/Sep/2020:15:43:39 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-05 22:34:56
200.116.171.189 attackspam
SmallBizIT.US 1 packets to tcp(23)
2020-09-05 22:18:01
182.182.26.226 attackspam
Sep  4 18:50:54 mellenthin postfix/smtpd[31059]: NOQUEUE: reject: RCPT from unknown[182.182.26.226]: 554 5.7.1 Service unavailable; Client host [182.182.26.226] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/182.182.26.226; from= to= proto=ESMTP helo=<[182.182.26.226]>
2020-09-05 22:41:01
198.23.250.38 attackbots
(From eric@talkwithwebvisitor.com) Cool website!

My name’s Eric, and I just found your site - myvenicechiropractor.com - while surfing the net. You showed up at the top of the search results, so I checked you out. Looks like what you’re doing is pretty cool.
 
But if you don’t mind me asking – after someone like me stumbles across myvenicechiropractor.com, what usually happens?

Is your site generating leads for your business? 
 
I’m guessing some, but I also bet you’d like more… studies show that 7 out 10 who land on a site wind up leaving without a trace.

Not good.

Here’s a thought – what if there was an easy way for every visitor to “raise their hand” to get a phone call from you INSTANTLY… the second they hit your site and said, “call me now.”

You can –
  
Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  It lets you know IMMEDIATELY – so that you can talk to that lead while they’re literally look
2020-09-05 22:46:20
212.64.69.175 attackbots
SSH Brute-Forcing (server2)
2020-09-05 22:21:06
178.128.248.121 attack
Sep  5 13:38:39 ip-172-31-16-56 sshd\[18726\]: Failed password for root from 178.128.248.121 port 56326 ssh2\
Sep  5 13:41:50 ip-172-31-16-56 sshd\[18859\]: Invalid user test1 from 178.128.248.121\
Sep  5 13:41:53 ip-172-31-16-56 sshd\[18859\]: Failed password for invalid user test1 from 178.128.248.121 port 60868 ssh2\
Sep  5 13:45:11 ip-172-31-16-56 sshd\[18889\]: Invalid user vector from 178.128.248.121\
Sep  5 13:45:14 ip-172-31-16-56 sshd\[18889\]: Failed password for invalid user vector from 178.128.248.121 port 37320 ssh2\
2020-09-05 22:53:11
190.134.23.31 attack
Sep  4 18:51:09 mellenthin postfix/smtpd[32153]: NOQUEUE: reject: RCPT from r190-134-23-31.dialup.adsl.anteldata.net.uy[190.134.23.31]: 554 5.7.1 Service unavailable; Client host [190.134.23.31] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/190.134.23.31; from= to= proto=ESMTP helo=
2020-09-05 22:30:15
119.254.7.114 attackspam
k+ssh-bruteforce
2020-09-05 22:24:13
106.0.6.236 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 22:42:45
185.220.101.203 attackspambots
Sep  5 15:29:16 shivevps sshd[31092]: error: maximum authentication attempts exceeded for root from 185.220.101.203 port 32994 ssh2 [preauth]
Sep  5 15:34:10 shivevps sshd[31263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.203  user=root
Sep  5 15:34:12 shivevps sshd[31263]: Failed password for root from 185.220.101.203 port 2764 ssh2
...
2020-09-05 22:36:39
2.132.233.234 attackspambots
Sep  4 18:51:29 mellenthin postfix/smtpd[32087]: NOQUEUE: reject: RCPT from unknown[2.132.233.234]: 554 5.7.1 Service unavailable; Client host [2.132.233.234] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/2.132.233.234; from= to= proto=ESMTP helo=<[2.132.233.234]>
2020-09-05 22:10:49
104.168.99.225 attackbotsspam
Scanning
2020-09-05 22:44:26
222.186.175.215 attackbots
Sep  5 16:31:13 nextcloud sshd\[8620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Sep  5 16:31:16 nextcloud sshd\[8620\]: Failed password for root from 222.186.175.215 port 39234 ssh2
Sep  5 16:31:37 nextcloud sshd\[8837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
2020-09-05 22:48:09
201.43.35.60 attackspambots
Sep  5 12:35:56 dev0-dcde-rnet sshd[17166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.43.35.60
Sep  5 12:35:57 dev0-dcde-rnet sshd[17166]: Failed password for invalid user imr from 201.43.35.60 port 52138 ssh2
Sep  5 12:39:15 dev0-dcde-rnet sshd[17258]: Failed password for root from 201.43.35.60 port 58368 ssh2
2020-09-05 22:16:03

Recently Reported IPs

104.21.20.116 104.21.20.121 104.21.20.123 104.21.20.133
104.21.20.130 104.21.20.129 104.21.68.139 104.21.20.144
104.21.20.145 104.21.20.149 104.21.20.139 104.21.20.138
104.21.20.135 104.21.20.152 104.21.20.153 104.21.20.151
104.21.20.155 104.21.20.154 104.21.68.143 104.21.20.165