Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.234.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.234.61.			IN	A

;; AUTHORITY SECTION:
.			298	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 19:23:10 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 61.234.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.234.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.171.75.251 attackbotsspam
Lines containing failures of 181.171.75.251
Jan 27 01:26:08 kmh-vmh-001-fsn05 sshd[5086]: Invalid user allan from 181.171.75.251 port 42774
Jan 27 01:26:08 kmh-vmh-001-fsn05 sshd[5086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.171.75.251 
Jan 27 01:26:10 kmh-vmh-001-fsn05 sshd[5086]: Failed password for invalid user allan from 181.171.75.251 port 42774 ssh2
Jan 27 01:26:11 kmh-vmh-001-fsn05 sshd[5086]: Received disconnect from 181.171.75.251 port 42774:11: Bye Bye [preauth]
Jan 27 01:26:11 kmh-vmh-001-fsn05 sshd[5086]: Disconnected from invalid user allan 181.171.75.251 port 42774 [preauth]
Jan 27 01:28:19 kmh-vmh-001-fsn05 sshd[5434]: Invalid user rasa from 181.171.75.251 port 49708
Jan 27 01:28:19 kmh-vmh-001-fsn05 sshd[5434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.171.75.251 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.171.75.251
2020-01-29 23:37:48
203.90.80.58 attackbotsspam
Unauthorized connection attempt detected from IP address 203.90.80.58 to port 2220 [J]
2020-01-29 23:08:29
201.141.95.133 attackbots
2019-01-31 02:36:24 H=\(customer-201-141-95-133.cablevision.net.mx\) \[201.141.95.133\]:3359 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-01-31 02:36:33 H=\(customer-201-141-95-133.cablevision.net.mx\) \[201.141.95.133\]:34648 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-01-31 02:36:39 H=\(customer-201-141-95-133.cablevision.net.mx\) \[201.141.95.133\]:42864 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-29 22:55:59
222.186.173.226 attack
Jan 29 05:21:16 php1 sshd\[29501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Jan 29 05:21:18 php1 sshd\[29501\]: Failed password for root from 222.186.173.226 port 54653 ssh2
Jan 29 05:21:32 php1 sshd\[29501\]: Failed password for root from 222.186.173.226 port 54653 ssh2
Jan 29 05:21:36 php1 sshd\[29507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Jan 29 05:21:38 php1 sshd\[29507\]: Failed password for root from 222.186.173.226 port 36101 ssh2
2020-01-29 23:22:28
201.131.203.14 attackspambots
2019-07-08 20:13:15 1hkY8X-00087c-9w SMTP connection from \(\[201.131.203.14\]\) \[201.131.203.14\]:16578 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 20:13:25 1hkY8i-00087v-32 SMTP connection from \(\[201.131.203.14\]\) \[201.131.203.14\]:16645 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 20:13:35 1hkY8s-000880-0p SMTP connection from \(\[201.131.203.14\]\) \[201.131.203.14\]:16691 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-29 23:08:54
106.75.55.123 attackspam
Unauthorized connection attempt detected from IP address 106.75.55.123 to port 2220 [J]
2020-01-29 23:09:28
200.87.95.70 attackbotsspam
2019-02-27 19:30:17 H=\(\[200.87.95.70\]\) \[200.87.95.70\]:11517 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-27 19:30:34 H=\(\[200.87.95.70\]\) \[200.87.95.70\]:13355 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-27 19:30:45 H=\(\[200.87.95.70\]\) \[200.87.95.70\]:28933 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-29 23:12:37
170.80.224.90 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-01-29 23:33:59
51.68.97.191 attackspambots
Jan 29 15:15:23 lnxded63 sshd[32042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.97.191
2020-01-29 23:15:31
200.75.136.78 attack
2019-07-08 19:12:18 1hkXBK-0006lB-BZ SMTP connection from \(velegal.com\) \[200.75.136.78\]:43801 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 19:13:19 1hkXCR-0006mF-2z SMTP connection from \(velegal.com\) \[200.75.136.78\]:43930 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 19:14:13 1hkXDG-0006mw-CH SMTP connection from \(velegal.com\) \[200.75.136.78\]:44024 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-29 23:25:28
171.224.118.155 attack
$f2bV_matches
2020-01-29 23:29:06
221.143.48.143 attack
Jan 29 04:43:38 eddieflores sshd\[30976\]: Invalid user kasturi from 221.143.48.143
Jan 29 04:43:38 eddieflores sshd\[30976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143
Jan 29 04:43:40 eddieflores sshd\[30976\]: Failed password for invalid user kasturi from 221.143.48.143 port 15766 ssh2
Jan 29 04:47:12 eddieflores sshd\[31497\]: Invalid user akul from 221.143.48.143
Jan 29 04:47:12 eddieflores sshd\[31497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143
2020-01-29 23:13:09
201.143.62.189 attackbotsspam
2019-07-09 01:20:37 1hkcvz-0007UW-Ga SMTP connection from 201.143.62.189.dsl.sta.telnor.net \[201.143.62.189\]:13187 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-09 01:20:45 1hkcw8-0007Ue-Ha SMTP connection from 201.143.62.189.dsl.sta.telnor.net \[201.143.62.189\]:13268 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-09 01:20:51 1hkcwD-0007Uk-IC SMTP connection from 201.143.62.189.dsl.sta.telnor.net \[201.143.62.189\]:13307 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-29 22:53:49
200.82.40.130 attackspam
2019-03-01 12:58:28 H=host130.200-82-40.telecom.net.ar \[200.82.40.130\]:48833 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-01 12:58:49 H=host130.200-82-40.telecom.net.ar \[200.82.40.130\]:49004 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-01 12:59:03 H=host130.200-82-40.telecom.net.ar \[200.82.40.130\]:49113 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-29 23:24:45
122.51.146.36 attackbotsspam
SSH bruteforce
2020-01-29 22:58:25

Recently Reported IPs

104.21.234.60 104.21.234.62 104.21.234.63 104.21.234.66
104.21.234.67 104.21.234.80 104.21.234.81 104.21.234.82
104.21.234.83 104.21.234.92 207.125.221.205 104.21.234.93
139.162.213.24 104.21.234.94 104.21.234.95 182.176.19.24
104.21.235.101 104.21.235.102 104.21.235.109 104.21.235.11