Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.30.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64344
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.30.122.			IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 20:24:47 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 122.30.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 122.30.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.0.128.249 attack
Absender hat Spam-Falle ausgel?st
2019-07-04 20:26:40
201.232.242.14 attackspambots
2019-07-04 06:28:57 H=adsl201-232-242-14.epm.net.co [201.232.242.14]:31135 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=201.232.242.14)
2019-07-04 06:28:58 unexpected disconnection while reading SMTP command from adsl201-232-242-14.epm.net.co [201.232.242.14]:31135 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-07-04 07:49:20 H=adsl201-232-242-14.epm.net.co [201.232.242.14]:40256 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=201.232.242.14)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=201.232.242.14
2019-07-04 20:10:52
114.199.113.78 attack
Absender hat Spam-Falle ausgel?st
2019-07-04 20:32:31
178.34.146.222 attackbots
Absender hat Spam-Falle ausgel?st
2019-07-04 20:22:40
139.99.123.74 attackspambots
Hit on /wp-login.php
2019-07-04 20:13:10
178.251.230.113 attack
Absender hat Spam-Falle ausgel?st
2019-07-04 20:22:02
88.86.212.11 attackspam
Absender hat Spam-Falle ausgel?st
2019-07-04 20:36:00
190.105.213.223 attack
hat 16 Verbindungen innerhalb von 1 Minuten hergestellt
2019-07-04 20:18:38
125.138.129.101 attack
Absender hat Spam-Falle ausgel?st
2019-07-04 20:29:27
185.68.195.152 attackbots
Absender hat Spam-Falle ausgel?st
2019-07-04 20:20:19
92.50.59.146 attack
Absender hat Spam-Falle ausgel?st
2019-07-04 20:35:24
39.36.27.219 attackbots
2019-07-04 07:08:48 H=([39.36.27.219]) [39.36.27.219]:4575 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=39.36.27.219)
2019-07-04 07:08:49 unexpected disconnection while reading SMTP command from ([39.36.27.219]) [39.36.27.219]:4575 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-07-04 07:46:59 H=([39.36.27.219]) [39.36.27.219]:33137 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=39.36.27.219)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.36.27.219
2019-07-04 20:05:19
125.209.123.181 attackbotsspam
Jul  4 13:49:24 localhost sshd\[23849\]: Invalid user suzanne from 125.209.123.181
Jul  4 13:49:24 localhost sshd\[23849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.209.123.181
Jul  4 13:49:26 localhost sshd\[23849\]: Failed password for invalid user suzanne from 125.209.123.181 port 56420 ssh2
Jul  4 13:53:10 localhost sshd\[24099\]: Invalid user ts from 125.209.123.181
Jul  4 13:53:10 localhost sshd\[24099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.209.123.181
...
2019-07-04 20:13:48
189.121.176.100 attackspambots
Jul  4 12:38:41 localhost sshd\[23727\]: Invalid user bot from 189.121.176.100 port 49187
Jul  4 12:38:41 localhost sshd\[23727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.121.176.100
Jul  4 12:38:43 localhost sshd\[23727\]: Failed password for invalid user bot from 189.121.176.100 port 49187 ssh2
2019-07-04 20:11:15
114.247.222.18 attackspam
Absender hat Spam-Falle ausgel?st
2019-07-04 20:32:04

Recently Reported IPs

104.21.30.118 104.21.30.125 104.21.30.126 104.21.30.128
104.21.30.13 104.21.30.130 104.21.30.133 104.21.30.135
104.21.30.145 104.21.30.147 104.21.30.151 104.21.30.152
44.183.174.131 104.21.30.153 104.21.30.155 104.21.30.16
104.21.30.160 104.21.30.162 104.21.30.164 104.21.30.166