Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.44.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13635
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.44.9.			IN	A

;; AUTHORITY SECTION:
.			528	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 22:37:10 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 9.44.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.44.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.52.86 attackbotsspam
Oct 24 08:48:09 ny01 sshd[22270]: Failed password for root from 222.186.52.86 port 60015 ssh2
Oct 24 08:52:28 ny01 sshd[22672]: Failed password for root from 222.186.52.86 port 51572 ssh2
Oct 24 08:52:31 ny01 sshd[22672]: Failed password for root from 222.186.52.86 port 51572 ssh2
Oct 24 08:52:34 ny01 sshd[22672]: Failed password for root from 222.186.52.86 port 51572 ssh2
2019-10-24 21:02:52
5.196.12.2 attackbots
WordPress wp-login brute force :: 5.196.12.2 0.132 BYPASS [24/Oct/2019:22:59:35  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-24 20:44:28
14.63.212.215 attack
Oct 24 02:13:46 php1 sshd\[28645\]: Invalid user com from 14.63.212.215
Oct 24 02:13:46 php1 sshd\[28645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.212.215
Oct 24 02:13:48 php1 sshd\[28645\]: Failed password for invalid user com from 14.63.212.215 port 54475 ssh2
Oct 24 02:18:40 php1 sshd\[29043\]: Invalid user t34yetu236t2etweyhedfruhe from 14.63.212.215
Oct 24 02:18:40 php1 sshd\[29043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.212.215
2019-10-24 20:43:05
72.139.119.82 attack
Oct 24 14:51:47 vps647732 sshd[857]: Failed password for root from 72.139.119.82 port 50088 ssh2
...
2019-10-24 20:56:01
94.41.165.68 attack
2019-09-16 17:53:02 1i9tJF-0004sv-F7 SMTP connection from \(94.41.165.68.dynamic.orsk.ufanet.ru\) \[94.41.165.68\]:28739 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-16 17:53:50 1i9tK0-0004u1-25 SMTP connection from \(94.41.165.68.dynamic.orsk.ufanet.ru\) \[94.41.165.68\]:28944 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-16 17:54:33 1i9tKf-0004vR-F6 SMTP connection from \(94.41.165.68.dynamic.orsk.ufanet.ru\) \[94.41.165.68\]:29121 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2019-10-24 21:03:36
171.244.10.50 attackspambots
Oct 24 12:03:48 *** sshd[13703]: Invalid user e from 171.244.10.50
2019-10-24 21:06:14
94.60.43.142 attackspambots
2019-03-08 17:51:41 1h2Iij-000182-7S SMTP connection from 142.43.60.94.rev.vodafone.pt \[94.60.43.142\]:17074 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 17:52:33 1h2IjX-00019J-PX SMTP connection from 142.43.60.94.rev.vodafone.pt \[94.60.43.142\]:17332 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 17:53:10 1h2IkA-0001AJ-JN SMTP connection from 142.43.60.94.rev.vodafone.pt \[94.60.43.142\]:32815 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2019-10-24 20:53:07
94.50.239.218 attack
2019-09-16 16:20:40 1i9rrr-0001nI-1q SMTP connection from \(\[94.50.239.218\]\) \[94.50.239.218\]:21923 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-16 16:20:56 1i9rs7-0001nf-G3 SMTP connection from \(\[94.50.239.218\]\) \[94.50.239.218\]:22123 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-16 16:21:05 1i9rsG-0001ny-PK SMTP connection from \(\[94.50.239.218\]\) \[94.50.239.218\]:22226 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2019-10-24 20:55:16
111.230.227.17 attack
Automatic report - Banned IP Access
2019-10-24 21:27:19
94.49.151.42 attack
2019-02-01 15:09:53 H=\(\[94.49.151.42\]\) \[94.49.151.42\]:39688 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-01 15:10:02 H=\(\[94.49.151.42\]\) \[94.49.151.42\]:39757 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-01 15:10:07 H=\(\[94.49.151.42\]\) \[94.49.151.42\]:39801 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2019-10-24 21:00:03
128.106.195.126 attack
Invalid user zabbix from 128.106.195.126 port 57081
2019-10-24 21:22:57
121.227.152.235 attack
Invalid user kodeit from 121.227.152.235 port 10788
2019-10-24 21:24:25
223.4.70.106 attackbotsspam
Invalid user ftpuser from 223.4.70.106 port 53742
2019-10-24 21:08:08
118.34.12.35 attack
Invalid user admin from 118.34.12.35 port 44218
2019-10-24 21:25:28
123.16.252.231 attackbotsspam
Invalid user admin from 123.16.252.231 port 44797
2019-10-24 21:23:24

Recently Reported IPs

104.21.44.86 104.21.44.91 104.21.44.94 104.21.44.95
104.21.45.10 104.21.45.100 104.21.45.101 104.21.45.102
104.21.45.103 104.21.45.107 104.21.45.112 104.21.45.113
104.21.45.123 104.21.45.128 104.21.45.131 103.146.13.174
104.21.45.132 104.21.45.134 52.40.1.8 104.21.45.136