Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.234.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50608
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.234.58.			IN	A

;; AUTHORITY SECTION:
.			408	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:18:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 58.234.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 58.234.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.38.186.84 attackspam
Aug 12 04:56:36 thevastnessof sshd[23370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.186.84
...
2019-08-12 15:40:22
159.65.152.201 attackspam
Aug 12 04:37:06 vpn01 sshd\[6772\]: Invalid user backup2 from 159.65.152.201
Aug 12 04:37:06 vpn01 sshd\[6772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.152.201
Aug 12 04:37:08 vpn01 sshd\[6772\]: Failed password for invalid user backup2 from 159.65.152.201 port 37848 ssh2
2019-08-12 15:48:46
134.119.221.7 attack
\[2019-08-12 03:14:20\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-12T03:14:20.098-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="90003246903433972",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/55928",ACLName="no_extension_match"
\[2019-08-12 03:17:29\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-12T03:17:29.563-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="90003346903433972",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/53719",ACLName="no_extension_match"
\[2019-08-12 03:20:26\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-12T03:20:26.244-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="90003446903433972",SessionID="0x7ff4d07e79a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/52349",ACLName="
2019-08-12 15:29:17
85.169.71.119 attackspambots
Aug 12 05:59:32 sshgateway sshd\[3176\]: Invalid user qhsupport from 85.169.71.119
Aug 12 05:59:32 sshgateway sshd\[3176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.169.71.119
Aug 12 05:59:34 sshgateway sshd\[3176\]: Failed password for invalid user qhsupport from 85.169.71.119 port 36736 ssh2
2019-08-12 15:39:16
185.220.101.56 attack
Aug 12 08:44:55 lnxmail61 sshd[26180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.56
Aug 12 08:44:57 lnxmail61 sshd[26180]: Failed password for invalid user adi from 185.220.101.56 port 43279 ssh2
Aug 12 08:52:54 lnxmail61 sshd[27406]: Failed password for root from 185.220.101.56 port 35007 ssh2
2019-08-12 15:19:32
103.215.72.227 attackbotsspam
Aug 12 07:46:19 h2022099 sshd[19710]: Invalid user az from 103.215.72.227
Aug 12 07:46:19 h2022099 sshd[19710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.72.227 
Aug 12 07:46:21 h2022099 sshd[19710]: Failed password for invalid user az from 103.215.72.227 port 54318 ssh2
Aug 12 07:46:21 h2022099 sshd[19710]: Received disconnect from 103.215.72.227: 11: Bye Bye [preauth]
Aug 12 07:54:18 h2022099 sshd[22034]: Invalid user sinus from 103.215.72.227
Aug 12 07:54:18 h2022099 sshd[22034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.72.227 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.215.72.227
2019-08-12 15:54:57
185.220.101.67 attackspam
Aug 12 09:20:57 km20725 sshd\[25239\]: Failed password for root from 185.220.101.67 port 33035 ssh2Aug 12 09:20:59 km20725 sshd\[25239\]: Failed password for root from 185.220.101.67 port 33035 ssh2Aug 12 09:21:02 km20725 sshd\[25239\]: Failed password for root from 185.220.101.67 port 33035 ssh2Aug 12 09:21:05 km20725 sshd\[25239\]: Failed password for root from 185.220.101.67 port 33035 ssh2
...
2019-08-12 15:27:20
82.62.104.253 attackbotsspam
19/8/11@22:36:50: FAIL: Alarm-Intrusion address from=82.62.104.253
...
2019-08-12 15:57:01
92.118.37.95 attackspam
Port scan on 10 port(s): 2025 2057 2083 3307 7575 50051 60008 60013 60026 60121
2019-08-12 15:09:57
200.196.249.170 attackspambots
Automatic report - Banned IP Access
2019-08-12 15:28:17
118.24.210.254 attackbotsspam
Aug 12 04:39:36 h2570396 sshd[454]: Failed password for invalid user edineide from 118.24.210.254 port 39794 ssh2
Aug 12 04:39:36 h2570396 sshd[454]: Received disconnect from 118.24.210.254: 11: Bye Bye [preauth]
Aug 12 04:57:55 h2570396 sshd[581]: Failed password for invalid user gogs from 118.24.210.254 port 39566 ssh2
Aug 12 04:57:55 h2570396 sshd[581]: Received disconnect from 118.24.210.254: 11: Bye Bye [preauth]
Aug 12 05:02:09 h2570396 sshd[2246]: Failed password for invalid user hadoop from 118.24.210.254 port 47526 ssh2
Aug 12 05:02:09 h2570396 sshd[2246]: Received disconnect from 118.24.210.254: 11: Bye Bye [preauth]
Aug 12 05:06:15 h2570396 sshd[2291]: Failed password for invalid user centos from 118.24.210.254 port 55618 ssh2
Aug 12 05:06:16 h2570396 sshd[2291]: Received disconnect from 118.24.210.254: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=118.24.210.254
2019-08-12 15:21:33
178.62.214.85 attackbots
Aug 12 02:38:27 sshgateway sshd\[2322\]: Invalid user sa from 178.62.214.85
Aug 12 02:38:27 sshgateway sshd\[2322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.214.85
Aug 12 02:38:29 sshgateway sshd\[2322\]: Failed password for invalid user sa from 178.62.214.85 port 34120 ssh2
2019-08-12 15:18:15
125.128.117.51 attack
Forbidden directory scan :: 2019/08/12 16:44:59 [error] 1094#1094: *49235 access forbidden by rule, client: 125.128.117.51, server: [censored_4], request: "GET /groups.sql HTTP/1.1", host: "[censored_4]", referrer: "http://[censored_4]/groups.sql"
2019-08-12 15:47:35
76.27.163.60 attackbotsspam
DATE:2019-08-12 09:32:44, IP:76.27.163.60, PORT:ssh SSH brute force auth (thor)
2019-08-12 15:40:51
45.55.190.106 attack
Tried sshing with brute force.
2019-08-12 15:29:52

Recently Reported IPs

104.21.68.232 104.21.234.8 104.21.234.72 104.21.234.59
104.21.234.86 104.21.234.73 104.21.234.98 104.21.234.9
104.21.234.99 104.21.234.87 104.21.235.103 104.21.235.100
104.21.235.108 104.21.235.106 104.21.68.234 104.21.235.105
104.21.235.104 104.21.235.116 104.21.235.107 104.21.235.114