Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.49.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4625
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.49.222.			IN	A

;; AUTHORITY SECTION:
.			376	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 23:15:19 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 222.49.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 222.49.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
156.206.128.112 attack
Unauthorized connection attempt detected from IP address 156.206.128.112 to port 23
2020-05-10 02:39:01
106.51.76.115 attackspambots
May  9 03:48:49 xeon sshd[28173]: Failed password for invalid user sai from 106.51.76.115 port 28550 ssh2
2020-05-10 02:18:43
45.74.25.66 attackbots
Unauthorized connection attempt detected from IP address 45.74.25.66 to port 445 [T]
2020-05-10 02:15:34
45.138.110.104 attack
3702/tcp 11211/tcp...
[2020-04-26/05-08]4pkt,2pt.(tcp)
2020-05-10 02:52:55
40.112.62.127 attack
"GET /robots.txt HTTP/1.1" 404
"GET /xmlrpc.php?rsd HTTP/1.1" 403
"GET /blog/robots.txt HTTP/1.1" 404
"GET /blog/ HTTP/1.1" 404
"GET /wordpress/ HTTP/1.1" 404
"GET /wp/ HTTP/1.1" 404
2020-05-10 02:15:54
101.109.247.156 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-10 02:31:35
27.72.112.112 attackbots
Mar 30 01:06:05 *** sshd[7485]: Did not receive identification string from 27.72.112.112
2020-05-10 02:46:39
118.25.7.83 attackspam
May  9 00:50:36 mailserver sshd\[29041\]: Invalid user nul from 118.25.7.83
...
2020-05-10 02:39:48
27.96.87.94 attack
port scan and connect, tcp 80 (http)
2020-05-10 02:16:16
156.238.1.143 attackspambots
May  9 06:34:34 haigwepa sshd[10968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.238.1.143 
May  9 06:34:36 haigwepa sshd[10968]: Failed password for invalid user sabina from 156.238.1.143 port 35702 ssh2
...
2020-05-10 02:53:37
178.128.247.181 attack
May  9 02:58:01 vpn01 sshd[28721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.247.181
May  9 02:58:03 vpn01 sshd[28721]: Failed password for invalid user jyoti from 178.128.247.181 port 36832 ssh2
...
2020-05-10 02:21:26
222.186.3.249 attackspambots
May  9 04:46:15 OPSO sshd\[7294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249  user=root
May  9 04:46:17 OPSO sshd\[7294\]: Failed password for root from 222.186.3.249 port 16664 ssh2
May  9 04:46:20 OPSO sshd\[7294\]: Failed password for root from 222.186.3.249 port 16664 ssh2
May  9 04:46:22 OPSO sshd\[7294\]: Failed password for root from 222.186.3.249 port 16664 ssh2
May  9 04:47:40 OPSO sshd\[7422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249  user=root
2020-05-10 02:13:58
45.14.45.2 attack
Port scan(s) denied
2020-05-10 02:46:12
45.58.134.98 attack
SSH login attempts.
2020-05-10 02:41:01
121.241.7.34 attack
Port scanning
2020-05-10 02:27:25

Recently Reported IPs

104.21.49.220 166.210.111.49 104.21.49.223 104.21.49.226
104.21.49.23 104.21.49.233 104.21.49.239 104.21.49.240
104.21.49.241 201.215.241.75 104.21.49.245 104.21.49.248
205.190.167.152 104.21.49.250 104.21.49.26 104.21.49.32
104.21.49.35 104.21.49.42 104.21.49.43 104.21.49.45