Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.36.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11513
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.36.13.			IN	A

;; AUTHORITY SECTION:
.			313	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:25:58 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 13.36.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.36.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
147.135.37.97 attackbotsspam
Port scanning while in xbox live player lobby and verbally stating that they would take over another player's account. Has also been reported to xbox.
2019-07-08 15:11:54
168.205.108.2 attackbotsspam
Brute force attack stopped by firewall
2019-07-08 14:48:36
168.228.150.142 attackbotsspam
Brute force attack stopped by firewall
2019-07-08 14:50:45
191.53.220.231 attackbots
Brute force attack stopped by firewall
2019-07-08 15:23:47
191.53.249.139 attackbotsspam
Jul  7 22:11:16 web1 postfix/smtpd[17365]: warning: unknown[191.53.249.139]: SASL PLAIN authentication failed: authentication failure
...
2019-07-08 15:40:13
187.84.58.86 attackbotsspam
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-08 14:52:19
179.189.202.169 attack
Brute force attack stopped by firewall
2019-07-08 15:26:43
193.56.29.107 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 04:52:26,437 INFO [amun_request_handler] PortScan Detected on Port: 445 (193.56.29.107)
2019-07-08 15:23:11
45.125.65.84 attackspambots
2019-07-08T07:44:39.239116ns1.unifynetsol.net postfix/smtpd\[19516\]: warning: unknown\[45.125.65.84\]: SASL LOGIN authentication failed: authentication failure
2019-07-08T08:54:14.898971ns1.unifynetsol.net postfix/smtpd\[26416\]: warning: unknown\[45.125.65.84\]: SASL LOGIN authentication failed: authentication failure
2019-07-08T10:03:51.652012ns1.unifynetsol.net postfix/smtpd\[4219\]: warning: unknown\[45.125.65.84\]: SASL LOGIN authentication failed: authentication failure
2019-07-08T11:13:30.928178ns1.unifynetsol.net postfix/smtpd\[17721\]: warning: unknown\[45.125.65.84\]: SASL LOGIN authentication failed: authentication failure
2019-07-08T12:23:56.689066ns1.unifynetsol.net postfix/smtpd\[25387\]: warning: unknown\[45.125.65.84\]: SASL LOGIN authentication failed: authentication failure
2019-07-08 15:26:16
168.228.148.75 attackbotsspam
Brute force attack stopped by firewall
2019-07-08 14:58:24
191.53.249.130 attackbotsspam
Brute force attempt
2019-07-08 15:03:36
187.109.61.90 attack
Brute force attack stopped by firewall
2019-07-08 15:10:19
189.91.5.121 attackspambots
Brute force attack stopped by firewall
2019-07-08 15:35:50
191.53.251.110 attack
Brute force attack stopped by firewall
2019-07-08 14:55:37
187.120.129.35 attackspambots
Brute force attack stopped by firewall
2019-07-08 15:15:30

Recently Reported IPs

104.21.36.143 104.21.36.149 104.21.36.152 104.21.36.153
104.21.36.144 104.21.36.154 104.21.36.159 104.21.36.16
104.21.36.160 104.21.69.193 228.91.71.125 104.21.36.163
104.21.36.156 104.21.36.169 104.21.36.173 104.21.36.171
104.21.36.167 104.21.36.180 104.21.36.175 104.21.36.181