Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.39.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.39.248.			IN	A

;; AUTHORITY SECTION:
.			290	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 21:41:11 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 248.39.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.39.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.217.135 attackspam
2020-08-15T07:21:23.833631abusebot-6.cloudsearch.cf sshd[18027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135  user=root
2020-08-15T07:21:25.979398abusebot-6.cloudsearch.cf sshd[18027]: Failed password for root from 178.128.217.135 port 56254 ssh2
2020-08-15T07:24:35.570652abusebot-6.cloudsearch.cf sshd[18144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135  user=root
2020-08-15T07:24:37.745871abusebot-6.cloudsearch.cf sshd[18144]: Failed password for root from 178.128.217.135 port 48268 ssh2
2020-08-15T07:27:12.261910abusebot-6.cloudsearch.cf sshd[18285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135  user=root
2020-08-15T07:27:14.321837abusebot-6.cloudsearch.cf sshd[18285]: Failed password for root from 178.128.217.135 port 35398 ssh2
2020-08-15T07:29:50.138918abusebot-6.cloudsearch.cf sshd[18359]: pam_unix(sshd:
...
2020-08-15 18:57:43
90.194.63.104 attackbotsspam
firewall-block, port(s): 23/tcp
2020-08-15 18:46:54
77.107.20.51 attack
Aug 14 12:40:05 ingram sshd[3497]: Invalid user admin from 77.107.20.51
Aug 14 12:40:05 ingram sshd[3497]: Failed none for invalid user admin from 77.107.20.51 port 46585 ssh2
Aug 14 12:40:05 ingram sshd[3497]: Failed password for invalid user admin from 77.107.20.51 port 46585 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.107.20.51
2020-08-15 19:16:14
116.6.234.141 attackspam
Aug 15 12:37:24 rancher-0 sshd[1093782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.6.234.141  user=root
Aug 15 12:37:25 rancher-0 sshd[1093782]: Failed password for root from 116.6.234.141 port 11963 ssh2
...
2020-08-15 19:01:36
106.12.151.250 attackspambots
frenzy
2020-08-15 18:58:00
72.128.118.43 attack
Aug 14 23:29:40 josie sshd[23916]: Invalid user admin from 72.128.118.43
Aug 14 23:29:40 josie sshd[23916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.128.118.43 
Aug 14 23:29:42 josie sshd[23916]: Failed password for invalid user admin from 72.128.118.43 port 55929 ssh2
Aug 14 23:29:42 josie sshd[23917]: Received disconnect from 72.128.118.43: 11: Bye Bye
Aug 14 23:29:43 josie sshd[23925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.128.118.43  user=r.r
Aug 14 23:29:45 josie sshd[23925]: Failed password for r.r from 72.128.118.43 port 55971 ssh2
Aug 14 23:29:45 josie sshd[23926]: Received disconnect from 72.128.118.43: 11: Bye Bye
Aug 14 23:29:46 josie sshd[23930]: Invalid user admin from 72.128.118.43
Aug 14 23:29:46 josie sshd[23930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.128.118.43 
Aug 14 23:29:47 josie sshd[23930]: Fai........
-------------------------------
2020-08-15 19:11:08
193.115.116.148 attackbots
Automatic report - Port Scan Attack
2020-08-15 19:14:48
222.180.149.101 attackspambots
"SSH brute force auth login attempt."
2020-08-15 19:10:21
103.7.38.180 attack
1597463368 - 08/15/2020 05:49:28 Host: 103.7.38.180/103.7.38.180 Port: 445 TCP Blocked
2020-08-15 19:10:07
172.105.89.161 attackbotsspam
 TCP (SYN) 172.105.89.161:57340 -> port 443, len 40
2020-08-15 18:45:30
5.253.86.213 attack
Telnet Server BruteForce Attack
2020-08-15 19:06:55
61.177.172.177 attackbots
Aug 15 12:45:06 ip40 sshd[26037]: Failed password for root from 61.177.172.177 port 36376 ssh2
Aug 15 12:45:12 ip40 sshd[26037]: Failed password for root from 61.177.172.177 port 36376 ssh2
...
2020-08-15 18:52:27
36.80.128.6 attackbots
1597463399 - 08/15/2020 05:49:59 Host: 36.80.128.6/36.80.128.6 Port: 445 TCP Blocked
2020-08-15 18:54:06
103.109.178.150 attack
Attempted Brute Force (dovecot)
2020-08-15 18:39:49
58.240.196.6 attack
Lines containing failures of 58.240.196.6
Aug 11 15:28:21 icinga sshd[30158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.240.196.6  user=r.r
Aug 11 15:28:22 icinga sshd[30158]: Failed password for r.r from 58.240.196.6 port 4341 ssh2
Aug 11 15:28:23 icinga sshd[30158]: Received disconnect from 58.240.196.6 port 4341:11: Bye Bye [preauth]
Aug 11 15:28:23 icinga sshd[30158]: Disconnected from authenticating user r.r 58.240.196.6 port 4341 [preauth]
Aug 11 15:43:05 icinga sshd[1950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.240.196.6  user=r.r
Aug 11 15:43:06 icinga sshd[1950]: Failed password for r.r from 58.240.196.6 port 4342 ssh2
Aug 11 15:43:06 icinga sshd[1950]: Received disconnect from 58.240.196.6 port 4342:11: Bye Bye [preauth]
Aug 11 15:43:06 icinga sshd[1950]: Disconnected from authenticating user r.r 58.240.196.6 port 4342 [preauth]
Aug 11 15:45:29 icinga sshd[2637]........
------------------------------
2020-08-15 19:01:18

Recently Reported IPs

104.21.39.243 104.21.39.29 104.21.39.31 104.21.39.34
104.21.39.36 104.21.39.42 147.43.159.69 104.21.39.5
104.21.39.53 104.21.39.64 104.21.39.67 104.21.39.7
104.21.39.70 104.21.39.74 75.85.165.146 104.21.39.75
104.21.39.76 104.21.39.81 104.21.39.82 104.21.39.86