Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.234.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.234.202.			IN	A

;; AUTHORITY SECTION:
.			567	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 08:44:26 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 202.234.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 202.234.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.175.73.3 attack
(From edwardfleetwood1@gmail.com) Hello there!

I'm a freelance digital marketing specialist who provides SEO services that can improve your search rankings. The boost in your ranking on Google search results will result in getting more unique visits from potential clients on your website, thus making the search engines like Google consider you as a more trusted website. This eventually leads to better credibility and more sales. 

If you're interested, I'll give you a free consultation to inform you about where your site currently stands, what can be done and what to expect once the site has been optimized. Please let me know what you think. I hope to speak with you soon. 

Best regards,
Edward Fleetwood
2019-10-21 17:29:22
152.249.245.68 attackbotsspam
Oct 21 11:23:14 cvbnet sshd[5856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.249.245.68 
Oct 21 11:23:16 cvbnet sshd[5856]: Failed password for invalid user graham from 152.249.245.68 port 41376 ssh2
...
2019-10-21 17:45:45
112.85.42.178 attack
Oct 21 02:56:17 lamijardin sshd[8996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=r.r
Oct 21 02:56:19 lamijardin sshd[8996]: Failed password for r.r from 112.85.42.178 port 43718 ssh2
Oct 21 02:56:34 lamijardin sshd[8996]: message repeated 5 serveres: [ Failed password for r.r from 112.85.42.178 port 43718 ssh2]
Oct 21 02:56:34 lamijardin sshd[8996]: error: maximum authentication attempts exceeded for r.r from 112.85.42.178 port 43718 ssh2 [preauth]
Oct 21 02:56:34 lamijardin sshd[8996]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=r.r
Oct 21 02:56:37 lamijardin sshd[8998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=r.r
Oct 21 02:56:40 lamijardin sshd[8998]: Failed password for r.r from 112.85.42.178 port 4293 ssh2
Oct 21 02:56:54 lamijardin sshd[8998]: message repeated 5 serveres: [ Faile........
-------------------------------
2019-10-21 17:26:28
106.12.198.21 attackspambots
Oct 20 18:54:36 wbs sshd\[2276\]: Invalid user Dark@2017 from 106.12.198.21
Oct 20 18:54:36 wbs sshd\[2276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.198.21
Oct 20 18:54:37 wbs sshd\[2276\]: Failed password for invalid user Dark@2017 from 106.12.198.21 port 38904 ssh2
Oct 20 19:00:03 wbs sshd\[2700\]: Invalid user xianzi123 from 106.12.198.21
Oct 20 19:00:03 wbs sshd\[2700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.198.21
2019-10-21 17:37:13
106.13.60.58 attack
Oct 21 11:37:51 dedicated sshd[29169]: Invalid user user from 106.13.60.58 port 35004
Oct 21 11:37:51 dedicated sshd[29169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.60.58 
Oct 21 11:37:51 dedicated sshd[29169]: Invalid user user from 106.13.60.58 port 35004
Oct 21 11:37:53 dedicated sshd[29169]: Failed password for invalid user user from 106.13.60.58 port 35004 ssh2
Oct 21 11:41:58 dedicated sshd[29705]: Invalid user motahar from 106.13.60.58 port 42156
2019-10-21 17:53:14
104.144.161.106 attackbots
(From william.rjones32@gmail.com) Hello!

I'm a mobile app developer that can design and program on any platform (Android, iOs) for an affordable price. There are various types of apps that can help your business, whether in terms of marketing, business efficiency, or both.Would you'd be interested in building a mobile app for your business? 

If you already have some ideas, I would love to hear about them to help you more on how we can make them all possible. I have many ideas of my own that I'd really like to share with you of things that have worked really well for my other clients.If you're interested in building an app, or getting more information about it, then I'd love to give you a free consultation. Kindly reply to let me know when you'd like to be contacted. I hope to speak with you soon.

Sincerely,
William Jones
2019-10-21 17:58:42
125.25.82.179 attack
Unauthorised access (Oct 21) SRC=125.25.82.179 LEN=52 TTL=114 ID=1240 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 21) SRC=125.25.82.179 LEN=52 TTL=115 ID=12008 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-21 17:55:41
167.86.118.159 attackspambots
Oct 19 11:39:38 server6 sshd[32153]: Failed password for r.r from 167.86.118.159 port 53574 ssh2
Oct 19 11:39:38 server6 sshd[32154]: Failed password for r.r from 167.86.118.159 port 37368 ssh2
Oct 19 11:39:38 server6 sshd[32157]: Failed password for r.r from 167.86.118.159 port 34364 ssh2
Oct 19 11:39:38 server6 sshd[32153]: Received disconnect from 167.86.118.159: 11: Normal Shutdown, Thank you for playing [preauth]
Oct 19 11:39:38 server6 sshd[32154]: Received disconnect from 167.86.118.159: 11: Normal Shutdown, Thank you for playing [preauth]
Oct 19 11:39:38 server6 sshd[32157]: Received disconnect from 167.86.118.159: 11: Normal Shutdown, Thank you for playing [preauth]
Oct 19 11:39:52 server6 sshd[32250]: Failed password for r.r from 167.86.118.159 port 36806 ssh2
Oct 19 11:39:52 server6 sshd[32249]: Failed password for r.r from 167.86.118.159 port 48832 ssh2
Oct 19 11:39:52 server6 sshd[32252]: Failed password for r.r from 167.86.118.159 port 45828 ssh2
Oct 19 11........
-------------------------------
2019-10-21 17:30:28
46.10.208.213 attack
2019-10-21T12:14:55.493529enmeeting.mahidol.ac.th sshd\[10761\]: User root from 46.10.208.213 not allowed because not listed in AllowUsers
2019-10-21T12:14:55.639485enmeeting.mahidol.ac.th sshd\[10761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.10.208.213  user=root
2019-10-21T12:14:57.409586enmeeting.mahidol.ac.th sshd\[10761\]: Failed password for invalid user root from 46.10.208.213 port 55938 ssh2
...
2019-10-21 17:43:59
144.217.255.89 attackbots
Automatic report - Banned IP Access
2019-10-21 17:51:41
150.242.213.189 attack
SSH Bruteforce attempt
2019-10-21 17:36:04
217.160.44.145 attackspambots
2019-10-21T09:15:03.329902shield sshd\[13452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.44.145  user=root
2019-10-21T09:15:06.066451shield sshd\[13452\]: Failed password for root from 217.160.44.145 port 41340 ssh2
2019-10-21T09:18:46.860056shield sshd\[14040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.44.145  user=root
2019-10-21T09:18:48.542844shield sshd\[14040\]: Failed password for root from 217.160.44.145 port 50364 ssh2
2019-10-21T09:22:32.508865shield sshd\[14522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.44.145  user=root
2019-10-21 17:27:30
51.75.23.62 attack
$f2bV_matches
2019-10-21 17:46:18
85.37.38.195 attackspambots
Oct 21 11:31:51 vpn01 sshd[5132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.37.38.195
Oct 21 11:31:53 vpn01 sshd[5132]: Failed password for invalid user ntp from 85.37.38.195 port 3283 ssh2
...
2019-10-21 17:36:47
190.248.67.123 attack
SSH/22 MH Probe, BF, Hack -
2019-10-21 17:31:51

Recently Reported IPs

104.21.234.201 104.21.234.203 104.21.234.238 104.21.234.239
104.21.234.38 104.21.234.39 165.99.240.75 104.21.234.4
104.21.234.5 104.21.234.6 104.21.234.7 96.163.201.24
104.21.234.70 104.21.234.71 104.21.234.74 104.21.234.75
104.21.234.76 104.21.234.77 104.21.234.96 128.202.218.100