Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.38.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22924
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.38.11.			IN	A

;; AUTHORITY SECTION:
.			439	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 21:27:54 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 11.38.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.38.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.223.185.249 attackbots
firewall-block, port(s): 1433/tcp
2020-04-19 17:38:30
106.12.70.118 attackspam
Apr 19 05:52:52 ws12vmsma01 sshd[60575]: Invalid user dy from 106.12.70.118
Apr 19 05:52:54 ws12vmsma01 sshd[60575]: Failed password for invalid user dy from 106.12.70.118 port 53878 ssh2
Apr 19 05:59:31 ws12vmsma01 sshd[61488]: Invalid user ro from 106.12.70.118
...
2020-04-19 17:17:25
79.124.8.95 attackbots
Apr 19 11:16:38 debian-2gb-nbg1-2 kernel: \[9546766.142183\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=79.124.8.95 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=33663 PROTO=TCP SPT=45456 DPT=40062 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-19 17:20:30
116.236.79.37 attackbots
Apr 19 09:33:55 roki-contabo sshd\[25267\]: Invalid user postgres from 116.236.79.37
Apr 19 09:33:55 roki-contabo sshd\[25267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.79.37
Apr 19 09:33:57 roki-contabo sshd\[25267\]: Failed password for invalid user postgres from 116.236.79.37 port 3437 ssh2
Apr 19 09:39:22 roki-contabo sshd\[25353\]: Invalid user et from 116.236.79.37
Apr 19 09:39:22 roki-contabo sshd\[25353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.79.37
...
2020-04-19 17:27:27
222.186.175.217 attack
[MK-Root1] SSH login failed
2020-04-19 17:47:06
129.28.181.103 attackbots
k+ssh-bruteforce
2020-04-19 17:45:24
129.211.30.94 attack
Apr 19 07:42:41 vps647732 sshd[16143]: Failed password for root from 129.211.30.94 port 55196 ssh2
...
2020-04-19 17:11:26
118.24.121.168 attack
2020-04-19T05:38:31.939581Z 63536ec8d340 New connection: 118.24.121.168:48838 (172.17.0.5:2222) [session: 63536ec8d340]
2020-04-19T05:49:37.084048Z 9430f5bea6f2 New connection: 118.24.121.168:43570 (172.17.0.5:2222) [session: 9430f5bea6f2]
2020-04-19 17:50:18
117.48.209.28 attackspam
Apr 19 07:07:26 srv206 sshd[1357]: Invalid user tj from 117.48.209.28
Apr 19 07:07:26 srv206 sshd[1357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.209.28
Apr 19 07:07:26 srv206 sshd[1357]: Invalid user tj from 117.48.209.28
Apr 19 07:07:27 srv206 sshd[1357]: Failed password for invalid user tj from 117.48.209.28 port 57344 ssh2
...
2020-04-19 17:21:37
118.126.110.18 attackspam
2020-04-19T08:27:06.732359sd-86998 sshd[16605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.110.18  user=root
2020-04-19T08:27:09.023904sd-86998 sshd[16605]: Failed password for root from 118.126.110.18 port 36844 ssh2
2020-04-19T08:30:43.583013sd-86998 sshd[16869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.110.18  user=root
2020-04-19T08:30:46.331178sd-86998 sshd[16869]: Failed password for root from 118.126.110.18 port 44106 ssh2
2020-04-19T08:34:21.711507sd-86998 sshd[17083]: Invalid user test2 from 118.126.110.18 port 51370
...
2020-04-19 17:33:32
106.12.189.89 attackspambots
Apr 19 10:54:03 vserver sshd\[10401\]: Invalid user csserver from 106.12.189.89Apr 19 10:54:05 vserver sshd\[10401\]: Failed password for invalid user csserver from 106.12.189.89 port 44742 ssh2Apr 19 10:58:19 vserver sshd\[10436\]: Invalid user jun from 106.12.189.89Apr 19 10:58:22 vserver sshd\[10436\]: Failed password for invalid user jun from 106.12.189.89 port 43240 ssh2
...
2020-04-19 17:23:52
220.178.75.153 attackbots
Apr 19 11:37:08 eventyay sshd[1785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.178.75.153
Apr 19 11:37:10 eventyay sshd[1785]: Failed password for invalid user test from 220.178.75.153 port 14972 ssh2
Apr 19 11:41:33 eventyay sshd[2047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.178.75.153
...
2020-04-19 17:41:45
183.89.237.234 attackbotsspam
(imapd) Failed IMAP login from 183.89.237.234 (TH/Thailand/mx-ll-183.89.237-234.dynamic.3bb.in.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 19 08:20:42 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=183.89.237.234, lip=5.63.12.44, session=
2020-04-19 17:10:39
183.129.53.115 attackbots
Email rejected due to spam filtering
2020-04-19 17:20:14
106.13.178.233 attackspambots
$f2bV_matches
2020-04-19 17:23:11

Recently Reported IPs

104.21.38.109 104.21.38.112 104.21.38.119 104.21.38.120
104.21.38.134 104.21.38.136 104.21.38.140 104.21.38.143
104.21.38.144 104.21.38.146 104.21.38.148 104.21.38.152
104.21.38.155 104.21.38.160 104.21.38.162 104.21.38.168
5.94.143.50 104.21.38.169 104.21.38.17 104.21.38.171