Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.4.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32359
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.4.91.			IN	A

;; AUTHORITY SECTION:
.			372	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:28:21 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 91.4.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.4.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.22 attackbotsspam
Jul 15 16:25:27 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.22 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=42803 PROTO=TCP SPT=49228 DPT=3387 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-16 00:35:48
46.149.182.92 attackspam
Jul 15 16:20:04 XXX sshd[11356]: Invalid user xbox from 46.149.182.92 port 37712
2019-07-16 01:04:38
92.118.160.13 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-16 00:43:13
37.49.227.12 attack
2019-07-15 19:22:25
notice
Firewall
priority:4, from WAN to ANY, TCP, service others, REJECT
37.49.227.12:59009
192.168.3.108:81
ACCESS BLOCK
2019-07-16 00:37:21
68.183.133.21 attackspam
Jul 15 18:55:15 MainVPS sshd[30184]: Invalid user upload from 68.183.133.21 port 54812
Jul 15 18:55:15 MainVPS sshd[30184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.133.21
Jul 15 18:55:15 MainVPS sshd[30184]: Invalid user upload from 68.183.133.21 port 54812
Jul 15 18:55:17 MainVPS sshd[30184]: Failed password for invalid user upload from 68.183.133.21 port 54812 ssh2
Jul 15 18:59:56 MainVPS sshd[30568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.133.21  user=root
Jul 15 18:59:58 MainVPS sshd[30568]: Failed password for root from 68.183.133.21 port 54494 ssh2
...
2019-07-16 01:10:50
112.85.42.227 attack
Jul 15 11:49:48 aat-srv002 sshd[16493]: Failed password for root from 112.85.42.227 port 12463 ssh2
Jul 15 11:50:36 aat-srv002 sshd[16502]: Failed password for root from 112.85.42.227 port 10314 ssh2
Jul 15 11:51:26 aat-srv002 sshd[16533]: Failed password for root from 112.85.42.227 port 29167 ssh2
...
2019-07-16 00:58:13
218.92.0.170 attackbotsspam
2019-07-15T15:37:40.380577abusebot-8.cloudsearch.cf sshd\[8656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.170  user=root
2019-07-16 00:52:12
185.137.111.132 attackspam
Jul 15 19:00:40 mail postfix/smtpd\[7047\]: warning: unknown\[185.137.111.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 19:02:05 mail postfix/smtpd\[7050\]: warning: unknown\[185.137.111.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 19:03:30 mail postfix/smtpd\[7046\]: warning: unknown\[185.137.111.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-16 01:18:54
201.249.89.102 attackspambots
Jul 15 17:59:52 debian sshd\[28186\]: Invalid user mike from 201.249.89.102 port 36084
Jul 15 17:59:52 debian sshd\[28186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.249.89.102
...
2019-07-16 01:13:19
193.32.163.182 attack
Jul 15 18:33:40 XXX sshd[48367]: Invalid user admin from 193.32.163.182 port 34325
2019-07-16 01:04:59
185.173.35.29 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-16 00:31:34
80.96.202.214 attackbotsspam
" "
2019-07-16 00:54:31
218.92.0.199 attackbotsspam
Jul 15 15:35:14 srv-4 sshd\[20121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199  user=root
Jul 15 15:35:15 srv-4 sshd\[20121\]: Failed password for root from 218.92.0.199 port 64924 ssh2
Jul 15 15:35:26 srv-4 sshd\[20121\]: Failed password for root from 218.92.0.199 port 64924 ssh2
...
2019-07-16 00:24:31
104.131.103.14 attackbots
LGS,WP GET /wp-login.php
2019-07-16 00:18:22
60.30.92.74 attackbots
Jul 15 17:11:50 localhost sshd\[45923\]: Invalid user rb from 60.30.92.74 port 59753
Jul 15 17:11:50 localhost sshd\[45923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.30.92.74
...
2019-07-16 00:25:40

Recently Reported IPs

104.21.4.90 104.21.4.89 104.21.4.96 104.21.4.99
104.21.40.109 104.21.40.106 104.21.40.123 104.21.40.111
104.21.40.126 104.21.40.113 104.21.69.29 104.21.4.94
104.21.40.114 104.21.40.13 104.21.40.130 104.21.40.108
104.21.40.131 104.21.40.14 104.21.40.136 104.21.40.147