Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.28.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.28.21.			IN	A

;; AUTHORITY SECTION:
.			446	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:35:29 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 21.28.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.28.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.52.236.67 attack
Sep 22 11:27:48 auw2 sshd\[7977\]: Invalid user hacker from 181.52.236.67
Sep 22 11:27:48 auw2 sshd\[7977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.52.236.67
Sep 22 11:27:50 auw2 sshd\[7977\]: Failed password for invalid user hacker from 181.52.236.67 port 36986 ssh2
Sep 22 11:32:30 auw2 sshd\[8434\]: Invalid user ikbal from 181.52.236.67
Sep 22 11:32:30 auw2 sshd\[8434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.52.236.67
2019-09-23 05:48:30
193.19.133.1 attackbotsspam
Automatic report - Port Scan Attack
2019-09-23 06:00:14
106.13.201.142 attack
Sep 22 17:39:05 ny01 sshd[15893]: Failed password for root from 106.13.201.142 port 49422 ssh2
Sep 22 17:43:53 ny01 sshd[17011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.201.142
Sep 22 17:43:55 ny01 sshd[17011]: Failed password for invalid user marli from 106.13.201.142 port 32934 ssh2
2019-09-23 05:45:29
104.131.111.64 attack
Sep 22 23:31:38 vps691689 sshd[23517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.111.64
Sep 22 23:31:39 vps691689 sshd[23517]: Failed password for invalid user gateway from 104.131.111.64 port 59196 ssh2
Sep 22 23:37:10 vps691689 sshd[23628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.111.64
...
2019-09-23 05:49:54
46.117.251.139 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/46.117.251.139/ 
 IL - 1H : (14)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IL 
 NAME ASN : ASN1680 
 
 IP : 46.117.251.139 
 
 CIDR : 46.117.0.0/16 
 
 PREFIX COUNT : 146 
 
 UNIQUE IP COUNT : 1483776 
 
 
 WYKRYTE ATAKI Z ASN1680 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 2 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-23 05:52:41
106.12.78.161 attackbotsspam
Sep 22 11:49:35 friendsofhawaii sshd\[14519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.161  user=root
Sep 22 11:49:36 friendsofhawaii sshd\[14519\]: Failed password for root from 106.12.78.161 port 54980 ssh2
Sep 22 11:52:53 friendsofhawaii sshd\[14776\]: Invalid user whg from 106.12.78.161
Sep 22 11:52:53 friendsofhawaii sshd\[14776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.161
Sep 22 11:52:55 friendsofhawaii sshd\[14776\]: Failed password for invalid user whg from 106.12.78.161 port 56838 ssh2
2019-09-23 05:59:34
67.21.36.2 attackspambots
scan z
2019-09-23 05:55:30
185.238.44.38 attackspam
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-23 06:13:23
94.176.77.55 attackbotsspam
(Sep 23)  LEN=40 TTL=244 ID=53604 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=54148 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=48897 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=47248 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=24105 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=14749 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=45582 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=30281 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=36515 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=40615 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=10970 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=56578 DF TCP DPT=23 WINDOW=14600 SYN 
 (Sep 22)  LEN=40 TTL=244 ID=7392 DF TCP DPT=23 WINDOW=14600 SYN
2019-09-23 05:47:04
185.234.219.175 attack
2019-09-20 00:36:22 -> 2019-09-22 22:55:03 : 1699 login attempts (185.234.219.175)
2019-09-23 06:04:08
46.38.144.202 attack
Sep 22 23:33:37 mail postfix/smtpd\[24526\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 23:36:01 mail postfix/smtpd\[23985\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 23:38:22 mail postfix/smtpd\[31041\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-23 05:50:57
159.65.85.105 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-09-23 06:08:19
132.232.52.60 attackbotsspam
Sep 22 21:40:01 *** sshd[4682]: Invalid user start from 132.232.52.60
2019-09-23 05:59:08
203.128.242.166 attackbots
Sep 22 23:58:36 dedicated sshd[24930]: Invalid user vweru from 203.128.242.166 port 54472
2019-09-23 06:01:37
37.119.101.235 attackspambots
8000/tcp 81/tcp
[2019-09-22]2pkt
2019-09-23 05:47:50

Recently Reported IPs

104.21.28.192 104.21.28.242 104.21.28.37 104.21.28.45
104.21.28.43 104.21.28.181 128.127.71.141 104.21.28.53
104.21.28.7 104.21.28.96 104.21.28.59 104.21.28.87
104.21.28.71 104.21.28.97 104.21.29.146 104.21.29.134
104.21.29.148 104.21.29.161 104.21.29.174 104.21.29.183