Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.20.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.20.8.			IN	A

;; AUTHORITY SECTION:
.			114	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 18:51:50 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 8.20.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.20.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.111.60.13 attackbotsspam
445/tcp 1433/tcp...
[2020-09-27/10-04]4pkt,2pt.(tcp)
2020-10-05 20:18:18
173.212.246.117 attackspambots
Oct 5 14:33:26 *hidden* sshd[14257]: Failed password for *hidden* from 173.212.246.117 port 42926 ssh2 Oct 5 14:37:11 *hidden* sshd[17803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.246.117 user=root Oct 5 14:37:13 *hidden* sshd[17803]: Failed password for *hidden* from 173.212.246.117 port 49986 ssh2
2020-10-05 20:48:10
142.93.47.124 attackspam
4922/tcp 2859/tcp 22992/tcp...
[2020-08-07/10-04]188pkt,106pt.(tcp)
2020-10-05 20:10:06
104.143.38.34 attack
SP-Scan 52485:1433 detected 2020.10.04 16:15:56
blocked until 2020.11.23 08:18:43
2020-10-05 20:31:40
103.100.5.5 attack
[MK-Root1] Blocked by UFW
2020-10-05 20:45:29
49.233.182.177 attackspambots
6379/tcp 6379/tcp 6379/tcp...
[2020-09-03/10-04]4pkt,1pt.(tcp)
2020-10-05 20:37:44
206.189.231.196 attack
206.189.231.196 - - [05/Oct/2020:11:43:13 +0100] "POST /wp-login.php HTTP/1.1" 200 2463 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.231.196 - - [05/Oct/2020:11:43:15 +0100] "POST /wp-login.php HTTP/1.1" 200 2407 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.231.196 - - [05/Oct/2020:11:43:17 +0100] "POST /wp-login.php HTTP/1.1" 200 2441 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-05 20:20:44
35.189.50.72 attackspambots
1433/tcp 445/tcp
[2020-10-01/04]2pkt
2020-10-05 20:09:45
223.130.31.240 attackbotsspam
Port Scan: TCP/23
2020-10-05 20:43:20
45.150.206.113 attackspambots
Oct  5 14:20:09 cho postfix/smtpd[44623]: warning: unknown[45.150.206.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 14:20:27 cho postfix/smtpd[44623]: warning: unknown[45.150.206.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 14:21:13 cho postfix/smtps/smtpd[45021]: warning: unknown[45.150.206.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 14:21:29 cho postfix/smtps/smtpd[45021]: warning: unknown[45.150.206.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 14:22:09 cho postfix/smtps/smtpd[44418]: warning: unknown[45.150.206.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-05 20:32:58
85.72.131.37 attackspam
Mikrotik RouterOS-Based Botnet
2020-10-05 20:45:52
58.216.160.214 attack
1433/tcp 1433/tcp 1433/tcp...
[2020-08-10/10-04]8pkt,1pt.(tcp)
2020-10-05 20:41:00
68.66.193.24 attackspambots
Oct  5 00:03:09 journals sshd\[96695\]: Invalid user rpm from 68.66.193.24
Oct  5 00:03:09 journals sshd\[96695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.66.193.24
Oct  5 00:03:11 journals sshd\[96695\]: Failed password for invalid user rpm from 68.66.193.24 port 42954 ssh2
Oct  5 00:03:40 journals sshd\[96712\]: Invalid user testuser from 68.66.193.24
Oct  5 00:03:40 journals sshd\[96712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.66.193.24
...
2020-10-05 20:32:41
20.49.2.187 attackbots
sshd: Failed password for .... from 20.49.2.187 port 44780 ssh2 (4 attempts)
2020-10-05 20:41:56
60.167.176.184 attackspambots
Oct  4 21:50:36 vm1 sshd[514]: Failed password for root from 60.167.176.184 port 47616 ssh2
...
2020-10-05 20:46:51

Recently Reported IPs

216.235.73.147 236.81.89.9 104.21.20.81 104.21.20.84
104.21.20.90 240.249.96.89 104.21.20.92 56.99.0.26
104.21.20.94 104.21.20.95 5.71.206.51 104.21.21.101
104.21.21.103 104.21.21.104 104.21.21.105 104.21.21.107
104.21.21.109 104.21.21.11 104.21.21.116 104.21.21.119