Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.27.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14554
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.27.117.			IN	A

;; AUTHORITY SECTION:
.			485	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 19:53:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 117.27.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 117.27.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
39.100.231.144 attackspambots
port scan and connect, tcp 8080 (http-proxy)
2020-02-17 04:29:24
58.87.67.226 attack
Feb 16 07:43:57 sachi sshd\[17183\]: Invalid user bn from 58.87.67.226
Feb 16 07:43:57 sachi sshd\[17183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.67.226
Feb 16 07:43:59 sachi sshd\[17183\]: Failed password for invalid user bn from 58.87.67.226 port 39322 ssh2
Feb 16 07:48:28 sachi sshd\[17631\]: Invalid user zhouh from 58.87.67.226
Feb 16 07:48:28 sachi sshd\[17631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.67.226
2020-02-17 04:33:59
94.23.204.130 attack
Feb 16 17:54:21 MK-Soft-Root2 sshd[20327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.204.130 
Feb 16 17:54:23 MK-Soft-Root2 sshd[20327]: Failed password for invalid user llfu from 94.23.204.130 port 60214 ssh2
...
2020-02-17 04:05:24
45.70.125.19 attackspam
1581860647 - 02/16/2020 14:44:07 Host: 45.70.125.19/45.70.125.19 Port: 445 TCP Blocked
2020-02-17 04:39:17
206.189.132.204 attack
Invalid user ubuntu from 206.189.132.204 port 33624
2020-02-17 04:16:50
114.239.71.46 attack
port scan and connect, tcp 23 (telnet)
2020-02-17 04:35:01
185.220.101.24 attack
Automatic report - Banned IP Access
2020-02-17 04:41:12
58.122.118.18 attackspambots
Unauthorized connection attempt detected from IP address 58.122.118.18 to port 23
2020-02-17 04:30:04
185.10.129.235 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 04:14:46
185.179.24.37 attackspambots
Automatic report - XMLRPC Attack
2020-02-17 04:40:44
220.132.25.252 attackbotsspam
20/2/16@08:44:32: FAIL: Alarm-Telnet address from=220.132.25.252
...
2020-02-17 04:18:56
60.174.95.244 attack
port 23
2020-02-17 04:00:53
51.38.176.147 attackspam
Feb 16 22:47:18 gw1 sshd[16695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.176.147
Feb 16 22:47:21 gw1 sshd[16695]: Failed password for invalid user oracle from 51.38.176.147 port 56958 ssh2
...
2020-02-17 04:43:01
222.186.175.23 attackspambots
Fail2Ban Ban Triggered (2)
2020-02-17 04:08:43
184.90.73.120 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 04:25:31

Recently Reported IPs

212.226.10.243 104.21.27.122 104.21.27.123 21.165.145.47
104.21.27.129 176.35.219.87 104.21.27.131 104.21.27.132
104.21.27.133 85.171.186.51 104.21.27.134 104.21.27.135
54.205.195.63 104.21.27.137 104.21.27.14 104.21.27.141
104.21.27.144 104.21.27.145 96.107.118.243 104.21.27.149