Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.29.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2970
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.29.137.			IN	A

;; AUTHORITY SECTION:
.			183	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:21:54 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 137.29.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.29.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
156.197.176.151 attackbots
Invalid user admin from 156.197.176.151 port 53144
2019-08-23 20:51:48
220.167.100.60 attackbotsspam
Invalid user qhsupport from 220.167.100.60 port 48656
2019-08-23 20:32:29
181.49.102.190 attack
$f2bV_matches
2019-08-23 20:43:20
84.139.107.127 attack
Invalid user backup from 84.139.107.127 port 58554
2019-08-23 20:19:38
200.170.151.5 attackbots
Invalid user liu from 200.170.151.5 port 37331
2019-08-23 20:36:46
46.101.77.58 attackspambots
Aug 23 12:50:03 itv-usvr-02 sshd[2864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.77.58  user=root
Aug 23 12:50:05 itv-usvr-02 sshd[2864]: Failed password for root from 46.101.77.58 port 48008 ssh2
Aug 23 12:59:08 itv-usvr-02 sshd[2884]: Invalid user darkman from 46.101.77.58 port 42418
Aug 23 12:59:08 itv-usvr-02 sshd[2884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.77.58
Aug 23 12:59:08 itv-usvr-02 sshd[2884]: Invalid user darkman from 46.101.77.58 port 42418
Aug 23 12:59:09 itv-usvr-02 sshd[2884]: Failed password for invalid user darkman from 46.101.77.58 port 42418 ssh2
2019-08-23 19:52:53
54.38.184.10 attackspam
Invalid user km from 54.38.184.10 port 48234
2019-08-23 20:24:06
203.155.158.154 attackbotsspam
Invalid user vpn from 203.155.158.154 port 51356
2019-08-23 20:01:12
209.97.187.108 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-08-23 19:58:40
14.254.134.88 attack
Invalid user admin from 14.254.134.88 port 30658
2019-08-23 20:29:09
77.250.254.91 attackspam
Invalid user nickname from 77.250.254.91 port 58262
2019-08-23 20:20:43
189.7.121.28 attackspambots
Invalid user qhsupport from 189.7.121.28 port 32811
2019-08-23 20:39:30
163.172.191.192 attackspambots
Invalid user deployer from 163.172.191.192 port 36136
2019-08-23 20:48:48
37.187.79.55 attackspambots
Aug 23 01:39:48 web9 sshd\[28829\]: Invalid user haldaemon from 37.187.79.55
Aug 23 01:39:48 web9 sshd\[28829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.55
Aug 23 01:39:51 web9 sshd\[28829\]: Failed password for invalid user haldaemon from 37.187.79.55 port 43528 ssh2
Aug 23 01:43:30 web9 sshd\[29659\]: Invalid user looque from 37.187.79.55
Aug 23 01:43:30 web9 sshd\[29659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.55
2019-08-23 19:54:45
159.89.204.28 attackbotsspam
Invalid user sham from 159.89.204.28 port 39574
2019-08-23 20:50:21

Recently Reported IPs

104.21.29.140 104.21.29.142 104.21.29.151 104.21.29.152
104.21.29.156 104.21.68.94 104.21.29.160 104.21.29.169
104.21.29.178 104.21.29.181 104.21.29.162 104.21.29.176
104.21.29.166 104.21.29.179 104.21.29.170 104.21.29.186
104.21.29.187 104.21.68.96 104.21.29.193 104.21.29.213