Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.39.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.39.224.			IN	A

;; AUTHORITY SECTION:
.			294	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 21:40:23 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 224.39.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 224.39.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.131.138.226 attack
Unauthorised access (Sep  9) SRC=183.131.138.226 LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=15378 DF TCP DPT=3389 WINDOW=8192 SYN 
Unauthorised access (Sep  8) SRC=183.131.138.226 LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=3640 DF TCP DPT=1433 WINDOW=8192 SYN
2019-09-09 09:12:41
78.188.47.209 attackspambots
8080/tcp 8080/tcp 8080/tcp
[2019-08-11/09-08]3pkt
2019-09-09 09:35:02
133.130.99.77 attackspambots
Sep  9 02:33:20 s64-1 sshd[22303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.77
Sep  9 02:33:21 s64-1 sshd[22303]: Failed password for invalid user web from 133.130.99.77 port 49210 ssh2
Sep  9 02:39:30 s64-1 sshd[22401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.77
...
2019-09-09 08:57:01
119.1.238.156 attackbotsspam
Sep  9 03:58:51 server sshd\[28079\]: Invalid user gitlab from 119.1.238.156 port 51347
Sep  9 03:58:51 server sshd\[28079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.1.238.156
Sep  9 03:58:53 server sshd\[28079\]: Failed password for invalid user gitlab from 119.1.238.156 port 51347 ssh2
Sep  9 04:05:52 server sshd\[3442\]: Invalid user oracle from 119.1.238.156 port 53264
Sep  9 04:05:52 server sshd\[3442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.1.238.156
2019-09-09 09:28:23
191.17.252.55 attack
port scan/probe/communication attempt
2019-09-09 09:06:56
27.254.130.97 attack
445/tcp 445/tcp 445/tcp...
[2019-07-09/09-08]16pkt,1pt.(tcp)
2019-09-09 08:44:05
190.213.184.8 attackbots
port scan/probe/communication attempt
2019-09-09 09:27:30
190.64.137.171 attackbotsspam
Sep  9 04:23:59 areeb-Workstation sshd[11484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.137.171
Sep  9 04:24:01 areeb-Workstation sshd[11484]: Failed password for invalid user test from 190.64.137.171 port 55884 ssh2
...
2019-09-09 09:16:00
184.64.13.67 attackspam
Sep  8 14:37:33 kapalua sshd\[31393\]: Invalid user test6 from 184.64.13.67
Sep  8 14:37:33 kapalua sshd\[31393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010650e549cedc71.cg.shawcable.net
Sep  8 14:37:35 kapalua sshd\[31393\]: Failed password for invalid user test6 from 184.64.13.67 port 57650 ssh2
Sep  8 14:41:59 kapalua sshd\[31965\]: Invalid user q1w2e3r4 from 184.64.13.67
Sep  8 14:41:59 kapalua sshd\[31965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010650e549cedc71.cg.shawcable.net
2019-09-09 08:52:51
112.85.42.174 attackbots
SSH Brute Force, server-1 sshd[27793]: Failed password for root from 112.85.42.174 port 4227 ssh2
2019-09-09 09:03:43
66.183.127.247 attackspam
Sep  8 20:46:30 vps200512 sshd\[31127\]: Invalid user proxyuser from 66.183.127.247
Sep  8 20:46:30 vps200512 sshd\[31127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.183.127.247
Sep  8 20:46:31 vps200512 sshd\[31127\]: Failed password for invalid user proxyuser from 66.183.127.247 port 56838 ssh2
Sep  8 20:50:45 vps200512 sshd\[31185\]: Invalid user sdtdserver from 66.183.127.247
Sep  8 20:50:45 vps200512 sshd\[31185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.183.127.247
2019-09-09 08:54:13
42.112.213.140 attack
445/tcp 445/tcp 445/tcp...
[2019-07-27/09-08]6pkt,1pt.(tcp)
2019-09-09 09:31:54
111.39.27.219 attackspam
Sep  9 02:23:06 ncomp postfix/smtpd[3722]: warning: unknown[111.39.27.219]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 02:23:21 ncomp postfix/smtpd[3722]: warning: unknown[111.39.27.219]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 02:23:36 ncomp postfix/smtpd[3722]: warning: unknown[111.39.27.219]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-09 09:10:28
45.136.109.34 attackbots
09/08/2019-19:39:50.909025 45.136.109.34 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-09 09:07:51
77.227.240.201 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-09-09 09:24:15

Recently Reported IPs

104.21.39.223 104.21.39.228 104.21.39.23 104.21.39.230
104.21.39.232 104.21.39.235 104.21.39.238 104.21.39.239
104.21.39.242 104.21.39.243 104.21.39.248 104.21.39.29
104.21.39.31 104.21.39.34 104.21.39.36 104.21.39.42
147.43.159.69 104.21.39.5 104.21.39.53 104.21.39.64