Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.4.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.4.14.			IN	A

;; AUTHORITY SECTION:
.			173	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:30:08 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 14.4.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.4.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.255.33.30 attackbotsspam
Unauthorized connection attempt from IP address 81.255.33.30 on Port 445(SMB)
2020-06-09 02:47:43
149.202.45.11 attack
[munged]::443 149.202.45.11 - - [08/Jun/2020:20:24:19 +0200] "POST /[munged]: HTTP/1.1" 200 9214 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 149.202.45.11 - - [08/Jun/2020:20:24:21 +0200] "POST /[munged]: HTTP/1.1" 200 9214 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 149.202.45.11 - - [08/Jun/2020:20:24:23 +0200] "POST /[munged]: HTTP/1.1" 200 9214 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 149.202.45.11 - - [08/Jun/2020:20:24:24 +0200] "POST /[munged]: HTTP/1.1" 200 9214 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 149.202.45.11 - - [08/Jun/2020:20:24:26 +0200] "POST /[munged]: HTTP/1.1" 200 9214 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 149.202.45.11 - - [08/Jun/2020:20:24:28 +0200] "POST /[munged]: HTTP/1.1" 200 9214 "-" "Mozilla/5.0 (X11; Ubun
2020-06-09 02:40:45
157.245.233.164 attackbotsspam
157.245.233.164 - - [08/Jun/2020:18:35:58 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.233.164 - - [08/Jun/2020:18:36:00 +0100] "POST /wp-login.php HTTP/1.1" 200 1860 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.233.164 - - [08/Jun/2020:18:36:01 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-09 02:45:01
101.109.42.62 attackspam
Unauthorized connection attempt from IP address 101.109.42.62 on Port 445(SMB)
2020-06-09 02:56:12
190.85.54.158 attack
Jun  8 17:11:38 tuxlinux sshd[52285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.54.158  user=root
Jun  8 17:11:40 tuxlinux sshd[52285]: Failed password for root from 190.85.54.158 port 60554 ssh2
Jun  8 17:11:38 tuxlinux sshd[52285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.54.158  user=root
Jun  8 17:11:40 tuxlinux sshd[52285]: Failed password for root from 190.85.54.158 port 60554 ssh2
Jun  8 17:26:56 tuxlinux sshd[53875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.54.158  user=root
...
2020-06-09 02:52:18
186.250.89.72 attackspam
Bruteforce detected by fail2ban
2020-06-09 02:39:04
51.91.56.133 attackspambots
2020-06-07 08:17:06 server sshd[79613]: Failed password for invalid user root from 51.91.56.133 port 36754 ssh2
2020-06-09 02:59:51
125.16.66.69 attackspam
Unauthorized connection attempt from IP address 125.16.66.69 on Port 445(SMB)
2020-06-09 02:46:00
47.56.18.26 attack
Lines containing failures of 47.56.18.26
Jun  8 15:07:09 nexus sshd[19179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.56.18.26  user=r.r
Jun  8 15:07:11 nexus sshd[19179]: Failed password for r.r from 47.56.18.26 port 60164 ssh2
Jun  8 15:07:11 nexus sshd[19179]: Received disconnect from 47.56.18.26 port 60164:11: Bye Bye [preauth]
Jun  8 15:07:11 nexus sshd[19179]: Disconnected from 47.56.18.26 port 60164 [preauth]
Jun  8 15:19:59 nexus sshd[19457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.56.18.26  user=r.r
Jun  8 15:20:01 nexus sshd[19457]: Failed password for r.r from 47.56.18.26 port 38516 ssh2
Jun  8 15:20:02 nexus sshd[19457]: Received disconnect from 47.56.18.26 port 38516:11: Bye Bye [preauth]
Jun  8 15:20:02 nexus sshd[19457]: Disconnected from 47.56.18.26 port 38516 [preauth]
Jun  8 15:25:20 nexus sshd[19699]: pam_unix(sshd:auth): authentication failure; logname=........
------------------------------
2020-06-09 03:00:25
182.72.101.22 attack
Honeypot attack, port: 445, PTR: nsg-static-022.101.72.182.airtel.in.
2020-06-09 02:39:17
115.68.207.164 attack
Jun  8 22:34:13 gw1 sshd[21300]: Failed password for root from 115.68.207.164 port 43768 ssh2
...
2020-06-09 03:02:22
88.214.26.53 attack
 TCP (SYN) 88.214.26.53:42069 -> port 5678, len 44
2020-06-09 02:49:37
141.98.10.171 attackspam
2020-06-08 19:20:47 SMTP protocol synchronization error (input sent without waiting for greeting): rejected connection from H=[141.98.10.171] input="\003"
2020-06-08 21:19:37 SMTP protocol synchronization error (input sent without waiting for greeting): rejected connection from H=[141.98.10.171] input="\003"
...
2020-06-09 03:08:53
42.112.217.19 attack
Unauthorized connection attempt from IP address 42.112.217.19 on Port 445(SMB)
2020-06-09 03:07:14
183.82.141.126 attackspam
Unauthorized connection attempt from IP address 183.82.141.126 on Port 445(SMB)
2020-06-09 02:58:09

Recently Reported IPs

120.57.211.89 120.57.215.225 120.57.219.52 120.57.214.230
120.57.214.105 120.57.210.206 120.57.221.188 120.70.103.128
120.57.223.49 104.21.4.165 120.70.96.126 120.69.124.72
120.70.51.94 120.70.96.203 120.70.103.42 104.21.4.166
120.41.135.30 104.21.4.172 104.21.4.194 104.21.4.211