Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.44.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.44.16.			IN	A

;; AUTHORITY SECTION:
.			520	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 10:29:37 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 16.44.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.44.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.209.150.75 attackbots
Port scan detected on ports: 8080[TCP], 8080[TCP], 8080[TCP]
2020-02-05 04:54:53
95.25.2.225 attackbots
port scan and connect, tcp 23 (telnet)
2020-02-05 04:56:46
203.220.91.225 attackbotsspam
Lines containing failures of 203.220.91.225
Feb  4 12:02:39 metroid sshd[1146]: Invalid user testuser from 203.220.91.225 port 41254
Feb  4 12:02:39 metroid sshd[1146]: Received disconnect from 203.220.91.225 port 41254:11: Bye Bye [preauth]
Feb  4 12:02:39 metroid sshd[1146]: Disconnected from invalid user testuser 203.220.91.225 port 41254 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=203.220.91.225
2020-02-05 04:38:30
185.198.162.54 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-05 05:00:34
117.221.197.25 attackbotsspam
1580847663 - 02/04/2020 21:21:03 Host: 117.221.197.25/117.221.197.25 Port: 445 TCP Blocked
2020-02-05 04:30:01
171.25.193.234 attackspambots
02/04/2020-21:20:44.265682 171.25.193.234 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 16
2020-02-05 04:49:28
122.102.29.44 attack
Attack to Gaijin.net user account came from this IP in 02-04-2020.
2020-02-05 04:46:21
190.204.194.182 attackbots
1580847661 - 02/04/2020 21:21:01 Host: 190.204.194.182/190.204.194.182 Port: 445 TCP Blocked
2020-02-05 04:31:40
81.28.107.18 attackbotsspam
Feb  4 21:20:56  exim[32447]: [1\51] 1iz4go-0008RL-IQ H=frogs.youavto.com (frogs.procars-shop-pl.com) [81.28.107.18] F= rejected after DATA: This message scored 101.1 spam points.
2020-02-05 04:26:15
192.176.48.174 attackspambots
Honeypot attack, port: 5555, PTR: a174.broadband8.quicknet.se.
2020-02-05 04:57:33
167.99.83.237 attackbotsspam
Feb  4 10:18:08 hpm sshd\[17197\]: Invalid user monitor1 from 167.99.83.237
Feb  4 10:18:08 hpm sshd\[17197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.83.237
Feb  4 10:18:10 hpm sshd\[17197\]: Failed password for invalid user monitor1 from 167.99.83.237 port 49724 ssh2
Feb  4 10:21:03 hpm sshd\[17521\]: Invalid user docker123 from 167.99.83.237
Feb  4 10:21:03 hpm sshd\[17521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.83.237
2020-02-05 04:26:02
199.249.230.109 attack
02/04/2020-21:20:33.488893 199.249.230.109 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 47
2020-02-05 05:01:17
193.32.163.123 attackbotsspam
$f2bV_matches
2020-02-05 04:31:22
46.40.47.220 attackbots
Feb  4 21:21:01 grey postfix/smtpd\[6197\]: NOQUEUE: reject: RCPT from unknown\[46.40.47.220\]: 554 5.7.1 Service unavailable\; Client host \[46.40.47.220\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?46.40.47.220\; from=\ to=\ proto=ESMTP helo=\<220-47-40-46.cpe.sattrakt.net\>
...
2020-02-05 04:33:52
93.147.38.144 attackbotsspam
Feb  4 21:12:51 mxgate1 postfix/postscreen[19461]: CONNECT from [93.147.38.144]:34936 to [176.31.12.44]:25
Feb  4 21:12:51 mxgate1 postfix/dnsblog[19464]: addr 93.147.38.144 listed by domain zen.spamhaus.org as 127.0.0.11
Feb  4 21:12:51 mxgate1 postfix/dnsblog[19464]: addr 93.147.38.144 listed by domain zen.spamhaus.org as 127.0.0.4
Feb  4 21:12:51 mxgate1 postfix/dnsblog[19466]: addr 93.147.38.144 listed by domain cbl.abuseat.org as 127.0.0.2
Feb  4 21:12:51 mxgate1 postfix/dnsblog[19465]: addr 93.147.38.144 listed by domain bl.spamcop.net as 127.0.0.2
Feb  4 21:12:57 mxgate1 postfix/postscreen[19461]: DNSBL rank 4 for [93.147.38.144]:34936
Feb x@x
Feb  4 21:12:58 mxgate1 postfix/postscreen[19461]: HANGUP after 0.69 from [93.147.38.144]:34936 in tests after SMTP handshake
Feb  4 21:12:58 mxgate1 postfix/postscreen[19461]: DISCONNECT [93.147.38.144]:34936


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=93.147.38.144
2020-02-05 04:59:44

Recently Reported IPs

104.21.44.137 104.21.44.168 104.21.44.185 112.206.100.53
104.21.44.199 104.21.44.202 104.21.44.211 104.21.44.51
10.93.120.231 104.21.44.71 104.21.44.73 104.21.45.127
104.21.45.13 104.21.45.14 104.21.45.149 104.21.45.168
104.21.45.18 104.21.45.183 243.21.191.238 104.21.45.200