Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.39.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25137
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.39.34.			IN	A

;; AUTHORITY SECTION:
.			230	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 21:41:27 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 34.39.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.39.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.204.77.45 attackspam
SSH Brute Force
2019-12-11 21:25:34
183.105.217.170 attackspambots
Invalid user tronrud from 183.105.217.170 port 47920
2019-12-11 21:45:13
140.143.130.52 attackspam
$f2bV_matches
2019-12-11 21:28:57
167.114.185.237 attackspam
Invalid user boeckx from 167.114.185.237 port 39022
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.185.237
Failed password for invalid user boeckx from 167.114.185.237 port 39022 ssh2
Invalid user mil from 167.114.185.237 port 59020
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.185.237
2019-12-11 21:12:29
182.148.55.82 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-11 21:31:59
221.249.140.3 attack
Unauthorized connection attempt detected from IP address 221.249.140.3 to port 445
2019-12-11 21:44:45
138.68.242.220 attackspambots
Invalid user gotch from 138.68.242.220 port 56268
2019-12-11 21:34:35
128.14.181.106 attackspam
UTC: 2019-12-10 pkts: 2 port: 389/udp
2019-12-11 21:39:55
51.77.148.87 attackspambots
Dec  6 23:08:41 heissa sshd\[28936\]: Invalid user prudhomme from 51.77.148.87 port 43100
Dec  6 23:08:41 heissa sshd\[28936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.ip-51-77-148.eu
Dec  6 23:08:43 heissa sshd\[28936\]: Failed password for invalid user prudhomme from 51.77.148.87 port 43100 ssh2
Dec  6 23:18:35 heissa sshd\[30389\]: Invalid user qhsupport from 51.77.148.87 port 60106
Dec  6 23:18:35 heissa sshd\[30389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.ip-51-77-148.eu
2019-12-11 21:28:06
77.222.113.161 attackbots
Unauthorised access (Dec 11) SRC=77.222.113.161 LEN=48 TTL=117 ID=17919 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-11 21:40:59
1.1.157.118 attackspam
Unauthorized connection attempt detected from IP address 1.1.157.118 to port 445
2019-12-11 21:32:45
101.231.201.50 attack
Invalid user weblogic from 101.231.201.50 port 11434
2019-12-11 21:48:38
95.189.104.67 attack
Invalid user tomcat from 95.189.104.67 port 32898
2019-12-11 21:16:20
103.219.76.2 attackspam
Dec  7 22:20:56 heissa sshd\[18773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.76.2  user=ftp
Dec  7 22:20:58 heissa sshd\[18773\]: Failed password for ftp from 103.219.76.2 port 38676 ssh2
Dec  7 22:27:37 heissa sshd\[19796\]: Invalid user webadmin from 103.219.76.2 port 48298
Dec  7 22:27:37 heissa sshd\[19796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.76.2
Dec  7 22:27:38 heissa sshd\[19796\]: Failed password for invalid user webadmin from 103.219.76.2 port 48298 ssh2
2019-12-11 21:21:28
40.73.7.218 attackbotsspam
$f2bV_matches
2019-12-11 21:28:24

Recently Reported IPs

104.21.39.31 104.21.39.36 104.21.39.42 147.43.159.69
104.21.39.5 104.21.39.53 104.21.39.64 104.21.39.67
104.21.39.7 104.21.39.70 104.21.39.74 75.85.165.146
104.21.39.75 104.21.39.76 104.21.39.81 104.21.39.82
104.21.39.86 104.21.39.88 104.21.39.90 104.21.39.92