Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.49.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.49.11.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:33:21 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 11.49.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.49.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.122.149.85 attack
Sep 20 09:37:30 MK-Soft-VM5 sshd\[6297\]: Invalid user mikem from 186.122.149.85 port 39868
Sep 20 09:37:30 MK-Soft-VM5 sshd\[6297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.85
Sep 20 09:37:32 MK-Soft-VM5 sshd\[6297\]: Failed password for invalid user mikem from 186.122.149.85 port 39868 ssh2
...
2019-09-20 15:39:22
120.92.153.47 attack
SMTP:25. Blocked 8 login attempts in 12 days.
2019-09-20 15:24:32
180.96.69.215 attackbots
Sep 20 05:43:21 [host] sshd[15005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.69.215  user=root
Sep 20 05:43:24 [host] sshd[15005]: Failed password for root from 180.96.69.215 port 50578 ssh2
Sep 20 05:47:55 [host] sshd[15031]: Invalid user vivianne from 180.96.69.215
2019-09-20 15:19:50
40.73.73.130 attackspambots
Sep 20 00:35:51 XXXXXX sshd[65232]: Invalid user postgres from 40.73.73.130 port 57546
2019-09-20 15:49:33
204.57.7.9 attackbots
Automatic report - SSH Brute-Force Attack
2019-09-20 15:23:06
116.252.2.2 attackbotsspam
Fail2Ban Ban Triggered
2019-09-20 15:54:52
14.161.2.246 attack
Unauthorized connection attempt from IP address 14.161.2.246 on Port 445(SMB)
2019-09-20 15:20:08
60.29.241.2 attackbots
Sep 20 08:47:44 jane sshd[603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.29.241.2 
Sep 20 08:47:47 jane sshd[603]: Failed password for invalid user user from 60.29.241.2 port 44378 ssh2
...
2019-09-20 15:19:18
129.28.171.221 attackspambots
PHP DIESCAN Information Disclosure Vulnerability
2019-09-20 15:31:36
101.227.90.169 attackspambots
Invalid user ji from 101.227.90.169 port 55155
2019-09-20 15:52:23
36.62.241.46 attack
Sep 19 15:49:50 garuda postfix/smtpd[21350]: connect from unknown[36.62.241.46]
Sep 19 15:49:51 garuda postfix/smtpd[21352]: connect from unknown[36.62.241.46]
Sep 19 15:49:58 garuda postfix/smtpd[21352]: warning: unknown[36.62.241.46]: SASL LOGIN authentication failed: authentication failure
Sep 19 15:49:59 garuda postfix/smtpd[21352]: lost connection after AUTH from unknown[36.62.241.46]
Sep 19 15:49:59 garuda postfix/smtpd[21352]: disconnect from unknown[36.62.241.46] ehlo=1 auth=0/1 commands=1/2
Sep 19 15:50:14 garuda postfix/smtpd[21352]: connect from unknown[36.62.241.46]
Sep 19 15:50:25 garuda postfix/smtpd[21352]: warning: unknown[36.62.241.46]: SASL LOGIN authentication failed: authentication failure
Sep 19 15:50:27 garuda postfix/smtpd[21352]: lost connection after AUTH from unknown[36.62.241.46]
Sep 19 15:50:27 garuda postfix/smtpd[21352]: disconnect from unknown[36.62.241.46] ehlo=1 auth=0/1 commands=1/2
Sep 19 15:50:41 garuda postfix/smtpd[21352]: connect f........
-------------------------------
2019-09-20 15:36:41
185.53.88.91 attackbotsspam
SIPVicious Scanner Detection
2019-09-20 15:27:09
219.92.16.81 attackspambots
Invalid user zx from 219.92.16.81 port 33088
2019-09-20 15:38:25
154.119.7.3 attack
Invalid user ve from 154.119.7.3 port 54666
2019-09-20 15:56:20
123.122.247.106 attackbots
UTC: 2019-09-19 port: 22/tcp
2019-09-20 15:37:32

Recently Reported IPs

104.21.49.13 104.21.48.95 104.21.49.135 104.21.49.145
104.21.49.14 104.21.49.146 104.21.49.143 104.21.49.150
104.21.49.154 104.21.49.147 104.21.49.139 104.21.49.138
104.21.49.162 104.21.49.151 104.21.49.152 104.21.7.17
104.21.49.168 104.21.49.163 104.21.49.182 104.21.49.169