Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.41.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.41.77.			IN	A

;; AUTHORITY SECTION:
.			199	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 22:07:07 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 77.41.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 77.41.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.240.65.149 attackspam
Invalid user rb from 223.240.65.149 port 36024
2020-04-25 13:50:04
103.221.254.125 attackspam
Apr 25 05:57:02 web01.agentur-b-2.de postfix/smtpd[923801]: NOQUEUE: reject: RCPT from unknown[103.221.254.125]: 554 5.7.1 Service unavailable; Client host [103.221.254.125] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/103.221.254.125; from= to=<2c.thomssen@rhythm-and-arts.de> proto=ESMTP helo=
Apr 25 05:57:02 web01.agentur-b-2.de postfix/smtpd[923801]: NOQUEUE: reject: RCPT from unknown[103.221.254.125]: 554 5.7.1 Service unavailable; Client host [103.221.254.125] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/103.221.254.125; from= to=<3c.thomssen@rhythm-and-arts.de> proto=ESMTP helo=
Apr 25 05:57:02 web01.agentur-b-2.de postfix/smtpd[923801]: NOQUEUE: reject: RCPT from unknown[103.221.254.125]: 554 5.7.1 Service unavailable; Client host [103.221.254.125] blocked using zen.spamhaus.org; https://www.spa
2020-04-25 13:45:54
195.136.61.93 attack
xmlrpc attack
2020-04-25 13:46:32
103.114.104.179 attackspam
Apr 25 05:57:06 andromeda postfix/smtpd\[16723\]: warning: unknown\[103.114.104.179\]: SASL LOGIN authentication failed: authentication failure
Apr 25 05:57:16 andromeda postfix/smtpd\[16723\]: warning: unknown\[103.114.104.179\]: SASL LOGIN authentication failed: authentication failure
Apr 25 05:57:24 andromeda postfix/smtpd\[16723\]: warning: unknown\[103.114.104.179\]: SASL LOGIN authentication failed: authentication failure
Apr 25 05:57:32 andromeda postfix/smtpd\[16723\]: warning: unknown\[103.114.104.179\]: SASL LOGIN authentication failed: authentication failure
Apr 25 05:57:37 andromeda postfix/smtpd\[16723\]: warning: unknown\[103.114.104.179\]: SASL LOGIN authentication failed: authentication failure
2020-04-25 13:31:25
46.39.245.204 attackspambots
Apr 25 05:48:50 web01.agentur-b-2.de postfix/smtpd[923636]: NOQUEUE: reject: RCPT from unknown[46.39.245.204]: 554 5.7.1 Service unavailable; Client host [46.39.245.204] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/46.39.245.204 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to=<2c.thomssen@rhythm-and-arts.de> proto=ESMTP helo=<028.ru>
Apr 25 05:48:50 web01.agentur-b-2.de postfix/smtpd[923636]: NOQUEUE: reject: RCPT from unknown[46.39.245.204]: 554 5.7.1 Service unavailable; Client host [46.39.245.204] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/46.39.245.204 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to=<3c.thomssen@rhythm-and-arts.de> proto=ESMTP helo=<028.ru>
Apr 25 05:48:50 web01.agentur-b-2.de postfix/smtpd[923636]: NOQUEUE: reject: RCPT from unknown[46.39.245.204]: 554 5.7.1 Service unavailable; Client host [46.39.245.204] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/46.39.245.204 / https
2020-04-25 14:06:39
185.234.219.105 attackspam
Apr 25 06:37:14 web01.agentur-b-2.de postfix/smtpd[929649]: lost connection after CONNECT from unknown[185.234.219.105]
Apr 25 06:41:50 web01.agentur-b-2.de postfix/smtpd[929650]: warning: unknown[185.234.219.105]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 25 06:41:50 web01.agentur-b-2.de postfix/smtpd[929650]: lost connection after AUTH from unknown[185.234.219.105]
Apr 25 06:44:30 web01.agentur-b-2.de postfix/smtpd[928928]: warning: unknown[185.234.219.105]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 25 06:44:30 web01.agentur-b-2.de postfix/smtpd[928928]: lost connection after AUTH from unknown[185.234.219.105]
2020-04-25 13:59:57
123.206.90.149 attack
Apr 25 07:06:36 legacy sshd[30475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.90.149
Apr 25 07:06:39 legacy sshd[30475]: Failed password for invalid user psaftp from 123.206.90.149 port 57334 ssh2
Apr 25 07:10:52 legacy sshd[30619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.90.149
...
2020-04-25 13:38:16
41.76.169.43 attack
Apr 24 19:24:37 kapalua sshd\[5920\]: Invalid user ubuntu from 41.76.169.43
Apr 24 19:24:37 kapalua sshd\[5920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43
Apr 24 19:24:39 kapalua sshd\[5920\]: Failed password for invalid user ubuntu from 41.76.169.43 port 49616 ssh2
Apr 24 19:27:44 kapalua sshd\[6188\]: Invalid user nginx from 41.76.169.43
Apr 24 19:27:44 kapalua sshd\[6188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43
2020-04-25 13:36:05
184.170.209.177 attack
$f2bV_matches
2020-04-25 13:47:00
103.21.53.11 attack
2020-04-25T07:02:23.807021vps773228.ovh.net sshd[12247]: Failed password for invalid user jordan from 103.21.53.11 port 34626 ssh2
2020-04-25T07:07:21.321319vps773228.ovh.net sshd[12280]: Invalid user ts3server from 103.21.53.11 port 45260
2020-04-25T07:07:21.335438vps773228.ovh.net sshd[12280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.53.11
2020-04-25T07:07:21.321319vps773228.ovh.net sshd[12280]: Invalid user ts3server from 103.21.53.11 port 45260
2020-04-25T07:07:23.021925vps773228.ovh.net sshd[12280]: Failed password for invalid user ts3server from 103.21.53.11 port 45260 ssh2
...
2020-04-25 13:36:32
77.42.93.192 attack
Automatic report - Port Scan Attack
2020-04-25 13:51:53
69.94.158.125 attack
2020-04-25 1jSBUh-00034G-NK H=medical.ifixheal.com \(medical.porkaspk.com\) \[69.94.158.125\] rejected **REMOVED** : REJECTED - You seem to be a spammer!
2020-04-25 1jSCC3-00038E-DK H=medical.ifixheal.com \(medical.porkaspk.com\) \[69.94.158.125\] rejected **REMOVED** : REJECTED - You seem to be a spammer!
2020-04-25 1jSCC3-00038F-DK H=medical.ifixheal.com \(medical.porkaspk.com\) \[69.94.158.125\] rejected **REMOVED** : REJECTED - You seem to be a spammer!
2020-04-25 14:04:27
112.85.42.173 attackspambots
2020-04-25T05:44:58.768457abusebot-6.cloudsearch.cf sshd[14530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
2020-04-25T05:45:00.966648abusebot-6.cloudsearch.cf sshd[14530]: Failed password for root from 112.85.42.173 port 4723 ssh2
2020-04-25T05:45:04.474946abusebot-6.cloudsearch.cf sshd[14530]: Failed password for root from 112.85.42.173 port 4723 ssh2
2020-04-25T05:44:58.768457abusebot-6.cloudsearch.cf sshd[14530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
2020-04-25T05:45:00.966648abusebot-6.cloudsearch.cf sshd[14530]: Failed password for root from 112.85.42.173 port 4723 ssh2
2020-04-25T05:45:04.474946abusebot-6.cloudsearch.cf sshd[14530]: Failed password for root from 112.85.42.173 port 4723 ssh2
2020-04-25T05:44:58.768457abusebot-6.cloudsearch.cf sshd[14530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= r
...
2020-04-25 13:54:53
185.50.149.15 attack
Apr 25 07:32:31 nlmail01.srvfarm.net postfix/smtpd[1122230]: warning: unknown[185.50.149.15]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 25 07:32:31 nlmail01.srvfarm.net postfix/smtpd[1122230]: lost connection after AUTH from unknown[185.50.149.15]
Apr 25 07:32:37 nlmail01.srvfarm.net postfix/smtpd[1122230]: lost connection after AUTH from unknown[185.50.149.15]
Apr 25 07:32:43 nlmail01.srvfarm.net postfix/smtpd[1122515]: lost connection after AUTH from unknown[185.50.149.15]
Apr 25 07:32:48 nlmail01.srvfarm.net postfix/smtpd[1122230]: warning: unknown[185.50.149.15]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-25 14:01:33
96.93.196.89 attackbotsspam
Invalid user target from 96.93.196.89 port 58340
2020-04-25 13:35:52

Recently Reported IPs

104.21.41.72 104.21.41.81 104.21.41.82 243.116.43.172
104.21.41.84 104.21.41.88 104.21.41.89 243.26.248.172
104.21.41.9 186.147.190.117 104.21.41.90 104.21.41.92
104.21.41.96 104.21.41.99 104.21.42.10 104.21.42.103
104.21.42.108 97.22.85.102 104.21.42.11 104.21.42.111