Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.204.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47774
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.204.0.			IN	A

;; AUTHORITY SECTION:
.			125	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031701 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 18 07:28:37 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 0.204.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.204.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.199.121.32 attack
Apr 14 10:54:44 rotator sshd\[461\]: Failed password for root from 128.199.121.32 port 42844 ssh2Apr 14 10:57:41 rotator sshd\[1282\]: Invalid user sichenze from 128.199.121.32Apr 14 10:57:44 rotator sshd\[1282\]: Failed password for invalid user sichenze from 128.199.121.32 port 34122 ssh2Apr 14 11:00:38 rotator sshd\[2121\]: Invalid user test from 128.199.121.32Apr 14 11:00:39 rotator sshd\[2121\]: Failed password for invalid user test from 128.199.121.32 port 53598 ssh2Apr 14 11:03:39 rotator sshd\[2194\]: Failed password for root from 128.199.121.32 port 44730 ssh2
...
2020-04-14 19:09:33
1.85.218.237 attack
Lines containing failures of 1.85.218.237
Apr 13 23:05:35 newdogma sshd[10026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.85.218.237  user=r.r
Apr 13 23:05:37 newdogma sshd[10026]: Failed password for r.r from 1.85.218.237 port 35764 ssh2
Apr 13 23:05:39 newdogma sshd[10026]: Received disconnect from 1.85.218.237 port 35764:11: Bye Bye [preauth]
Apr 13 23:05:39 newdogma sshd[10026]: Disconnected from authenticating user r.r 1.85.218.237 port 35764 [preauth]
Apr 13 23:08:27 newdogma sshd[10048]: Invalid user ghostname from 1.85.218.237 port 46500
Apr 13 23:08:27 newdogma sshd[10048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.85.218.237 
Apr 13 23:08:29 newdogma sshd[10048]: Failed password for invalid user ghostname from 1.85.218.237 port 46500 ssh2
Apr 13 23:08:30 newdogma sshd[10048]: Received disconnect from 1.85.218.237 port 46500:11: Bye Bye [preauth]
Apr 13 23:08:30 newdo........
------------------------------
2020-04-14 19:27:29
202.67.42.44 attackbots
Unauthorized connection attempt from IP address 202.67.42.44 on Port 445(SMB)
2020-04-14 19:11:43
119.42.77.157 attack
Unauthorized connection attempt from IP address 119.42.77.157 on Port 445(SMB)
2020-04-14 19:09:52
106.124.131.214 attackspambots
Apr 14 05:43:34 pornomens sshd\[32403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.131.214  user=root
Apr 14 05:43:36 pornomens sshd\[32403\]: Failed password for root from 106.124.131.214 port 58196 ssh2
Apr 14 05:46:26 pornomens sshd\[32436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.131.214  user=root
...
2020-04-14 18:52:20
45.148.10.18 attack
2020-04-13 UTC: (10x) - ftp_user,root(9x)
2020-04-14 19:12:18
51.75.124.215 attackbotsspam
Brute force attempt
2020-04-14 19:03:20
113.134.211.28 attackspambots
Apr 14 10:48:34 ns3164893 sshd[7037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.28
Apr 14 10:48:36 ns3164893 sshd[7037]: Failed password for invalid user jennee from 113.134.211.28 port 58758 ssh2
...
2020-04-14 19:12:02
49.247.214.61 attack
Bruteforce detected by fail2ban
2020-04-14 18:58:18
113.176.89.22 attackbotsspam
1586836846 - 04/14/2020 06:00:46 Host: 113.176.89.22/113.176.89.22 Port: 445 TCP Blocked
2020-04-14 19:08:40
58.218.150.170 attackspambots
fail2ban
2020-04-14 19:28:28
85.93.20.106 attackbotsspam
Unauthorized connection attempt from IP address 85.93.20.106 on port 587
2020-04-14 19:20:30
89.248.169.12 attack
firewall-block, port(s): 993/tcp
2020-04-14 19:08:54
171.103.43.70 attack
Dovecot Invalid User Login Attempt.
2020-04-14 18:53:08
118.97.79.211 attackspambots
Apr 14 12:20:11 ns3164893 sshd[8839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.79.211
Apr 14 12:20:13 ns3164893 sshd[8839]: Failed password for invalid user dbmaker from 118.97.79.211 port 39254 ssh2
...
2020-04-14 19:21:44

Recently Reported IPs

104.21.202.203 104.21.205.252 104.21.205.75 104.21.206.16
104.21.206.54 104.21.207.236 104.21.212.162 104.21.213.185
104.21.217.244 104.22.12.88 104.22.13.88 104.22.14.17
104.22.14.191 104.22.15.17 104.22.15.191 104.22.16.122
104.22.17.122 104.22.17.246 104.22.2.102 104.22.2.147