Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.235.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.235.196.			IN	A

;; AUTHORITY SECTION:
.			134	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:30:43 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 196.235.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.235.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.163.216.23 attackspambots
Nov 30 18:40:39 sip sshd[12856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.216.23
Nov 30 18:40:41 sip sshd[12856]: Failed password for invalid user named from 45.163.216.23 port 44868 ssh2
Nov 30 18:58:14 sip sshd[16277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.216.23
2019-12-01 08:52:22
45.136.108.85 attackbots
Invalid user 0 from 45.136.108.85 port 49409
2019-12-01 08:54:57
117.50.1.12 attack
Nov 30 17:46:47 dallas01 sshd[24258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.1.12
Nov 30 17:46:49 dallas01 sshd[24258]: Failed password for invalid user de from 117.50.1.12 port 60656 ssh2
Nov 30 17:50:41 dallas01 sshd[24928]: Failed password for root from 117.50.1.12 port 35844 ssh2
2019-12-01 08:47:43
51.68.198.113 attack
Nov 29 16:32:00 sip sshd[18380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.113
Nov 29 16:32:02 sip sshd[18380]: Failed password for invalid user eli from 51.68.198.113 port 47350 ssh2
Nov 29 16:35:01 sip sshd[18917]: Failed password for root from 51.68.198.113 port 56004 ssh2
2019-12-01 08:40:16
49.88.112.55 attackspam
(sshd) Failed SSH login from 49.88.112.55 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 30 21:45:38 cwp sshd[3860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Nov 30 21:45:40 cwp sshd[3860]: Failed password for root from 49.88.112.55 port 4333 ssh2
Nov 30 21:45:43 cwp sshd[3860]: Failed password for root from 49.88.112.55 port 4333 ssh2
Nov 30 21:45:46 cwp sshd[3860]: Failed password for root from 49.88.112.55 port 4333 ssh2
Nov 30 21:45:49 cwp sshd[3860]: Failed password for root from 49.88.112.55 port 4333 ssh2
2019-12-01 08:46:28
61.190.171.144 attackspam
Nov 30 20:52:56 sip sshd[5440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.190.171.144
Nov 30 20:52:59 sip sshd[5440]: Failed password for invalid user kemba from 61.190.171.144 port 2298 ssh2
Nov 30 20:57:24 sip sshd[6270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.190.171.144
2019-12-01 08:28:19
218.92.0.134 attackspam
Dec  1 01:29:04 srv206 sshd[1119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.134  user=root
Dec  1 01:29:06 srv206 sshd[1119]: Failed password for root from 218.92.0.134 port 57810 ssh2
...
2019-12-01 08:35:55
49.248.167.102 attack
Apr 14 07:27:36 meumeu sshd[3083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.167.102 
Apr 14 07:27:38 meumeu sshd[3083]: Failed password for invalid user demo from 49.248.167.102 port 36982 ssh2
Apr 14 07:31:37 meumeu sshd[3798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.167.102 
...
2019-12-01 08:54:31
49.248.71.142 attackbotsspam
Apr 23 20:33:51 meumeu sshd[23913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.71.142 
Apr 23 20:33:53 meumeu sshd[23913]: Failed password for invalid user nh from 49.248.71.142 port 61305 ssh2
Apr 23 20:37:41 meumeu sshd[24357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.71.142 
...
2019-12-01 08:51:55
40.73.73.130 attackspam
Nov 30 14:11:32 sip sshd[28972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.73.130
Nov 30 14:11:33 sip sshd[28972]: Failed password for invalid user fortenberry from 40.73.73.130 port 39454 ssh2
Nov 30 14:28:23 sip sshd[31924]: Failed password for root from 40.73.73.130 port 58038 ssh2
2019-12-01 08:56:52
36.110.78.62 attackbots
Invalid user developer from 36.110.78.62 port 40100
2019-12-01 08:58:19
5.196.75.47 attackspambots
Dec  1 01:22:33 cp sshd[28480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.75.47
Dec  1 01:22:33 cp sshd[28480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.75.47
2019-12-01 08:43:48
54.36.182.244 attack
Nov 30 14:08:09 wbs sshd\[18458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-54-36-182.eu  user=root
Nov 30 14:08:12 wbs sshd\[18458\]: Failed password for root from 54.36.182.244 port 59981 ssh2
Nov 30 14:10:52 wbs sshd\[18750\]: Invalid user randell from 54.36.182.244
Nov 30 14:10:52 wbs sshd\[18750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-54-36-182.eu
Nov 30 14:10:54 wbs sshd\[18750\]: Failed password for invalid user randell from 54.36.182.244 port 35493 ssh2
2019-12-01 08:36:57
68.183.160.63 attack
Dec  1 00:51:27 SilenceServices sshd[6932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
Dec  1 00:51:28 SilenceServices sshd[6932]: Failed password for invalid user villone from 68.183.160.63 port 59492 ssh2
Dec  1 00:57:43 SilenceServices sshd[14546]: Failed password for root from 68.183.160.63 port 38350 ssh2
2019-12-01 08:25:08
61.163.190.49 attackbots
Invalid user ziehn from 61.163.190.49 port 59107
2019-12-01 08:51:43

Recently Reported IPs

104.21.235.151 104.18.23.156 104.21.235.177 104.21.235.157
104.21.235.117 104.21.235.118 104.21.235.169 104.21.235.178
73.150.113.78 104.21.235.216 104.18.23.160 104.21.235.71
104.21.235.67 104.21.235.215 104.21.24.114 104.21.24.109
104.21.24.144 104.21.235.72 104.21.235.87 104.21.24.145