Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.30.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.30.207.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 20:27:38 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 207.30.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.30.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.49.102.190 attack
$f2bV_matches
2019-09-04 18:18:35
176.31.172.40 attackbots
Sep  4 12:13:30 SilenceServices sshd[1301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.172.40
Sep  4 12:13:32 SilenceServices sshd[1301]: Failed password for invalid user moo from 176.31.172.40 port 41104 ssh2
Sep  4 12:17:23 SilenceServices sshd[2831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.172.40
2019-09-04 19:08:51
78.136.95.189 attack
[Aegis] @ 2019-09-04 04:22:10  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-09-04 18:57:35
122.161.192.206 attack
2019-09-04T10:34:20.051838hub.schaetter.us sshd\[8535\]: Invalid user P@ssw0rd123! from 122.161.192.206
2019-09-04T10:34:20.109554hub.schaetter.us sshd\[8535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.161.192.206
2019-09-04T10:34:21.451579hub.schaetter.us sshd\[8535\]: Failed password for invalid user P@ssw0rd123! from 122.161.192.206 port 50484 ssh2
2019-09-04T10:39:07.641314hub.schaetter.us sshd\[8551\]: Invalid user 123123 from 122.161.192.206
2019-09-04T10:39:07.675295hub.schaetter.us sshd\[8551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.161.192.206
...
2019-09-04 18:53:31
62.102.148.68 attackspambots
Sep  4 12:49:16 ubuntu-2gb-nbg1-dc3-1 sshd[32655]: Failed password for root from 62.102.148.68 port 54918 ssh2
Sep  4 12:49:21 ubuntu-2gb-nbg1-dc3-1 sshd[32655]: error: maximum authentication attempts exceeded for root from 62.102.148.68 port 54918 ssh2 [preauth]
...
2019-09-04 18:53:53
114.231.180.99 attack
Sep  3 23:24:00 localhost kernel: [1305256.810102] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.231.180.99 DST=[mungedIP2] LEN=52 TOS=0x08 PREC=0x20 TTL=108 ID=24106 DF PROTO=TCP SPT=57852 DPT=40 WINDOW=64240 RES=0x00 SYN URGP=0 
Sep  3 23:24:00 localhost kernel: [1305256.810129] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.231.180.99 DST=[mungedIP2] LEN=52 TOS=0x08 PREC=0x20 TTL=108 ID=24106 DF PROTO=TCP SPT=57852 DPT=40 SEQ=606302255 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402) 
Sep  3 23:24:01 localhost kernel: [1305257.809555] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.231.180.99 DST=[mungedIP2] LEN=52 TOS=0x08 PREC=0x20 TTL=108 ID=24107 DF PROTO=TCP SPT=57852 DPT=40 WINDOW=64240 RES=0x00 SYN URGP=0 
Sep  3 23:24:01 localhost kernel: [1305257.809563] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.231.180
2019-09-04 17:49:28
106.52.92.57 attack
Sep  4 10:24:07 mail sshd[26708]: Invalid user olga from 106.52.92.57
Sep  4 10:24:07 mail sshd[26708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.92.57
Sep  4 10:24:07 mail sshd[26708]: Invalid user olga from 106.52.92.57
Sep  4 10:24:09 mail sshd[26708]: Failed password for invalid user olga from 106.52.92.57 port 60120 ssh2
Sep  4 10:42:51 mail sshd[29031]: Invalid user webtest from 106.52.92.57
...
2019-09-04 17:52:21
196.15.211.92 attackspambots
[Aegis] @ 2019-09-04 08:15:52  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-09-04 18:04:08
64.63.91.191 attack
23/tcp 23/tcp 23/tcp
[2019-08-27/09-04]3pkt
2019-09-04 18:58:06
203.138.172.104 attackspam
tried it too often
2019-09-04 19:10:55
209.97.167.163 attack
$f2bV_matches
2019-09-04 18:26:56
112.85.42.237 attackbotsspam
Sep  4 06:16:05 TORMINT sshd\[30662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Sep  4 06:16:07 TORMINT sshd\[30662\]: Failed password for root from 112.85.42.237 port 19421 ssh2
Sep  4 06:16:39 TORMINT sshd\[30675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
...
2019-09-04 18:20:31
190.245.102.73 attackbots
Sep  4 07:12:38 tuotantolaitos sshd[14296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.245.102.73
Sep  4 07:12:40 tuotantolaitos sshd[14296]: Failed password for invalid user salim from 190.245.102.73 port 49826 ssh2
...
2019-09-04 18:21:37
189.197.63.14 attackbots
445/tcp 445/tcp 445/tcp...
[2019-07-05/09-04]15pkt,1pt.(tcp)
2019-09-04 19:05:36
112.85.42.229 attackspambots
Sep  4 10:44:08 debian sshd\[4795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229  user=root
Sep  4 10:44:10 debian sshd\[4795\]: Failed password for root from 112.85.42.229 port 37855 ssh2
...
2019-09-04 17:50:34

Recently Reported IPs

104.21.30.203 104.21.30.212 104.21.30.214 104.21.30.215
104.21.30.22 104.21.30.221 181.49.191.155 104.21.30.222
104.21.30.223 104.21.30.224 104.21.30.225 104.21.30.226
104.21.30.228 104.21.30.229 104.21.30.23 104.21.30.230
104.21.30.232 104.21.30.238 104.21.30.239 104.21.30.24