Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.49.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22787
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.49.23.			IN	A

;; AUTHORITY SECTION:
.			383	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 23:15:36 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 23.49.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 23.49.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.38.3.51 attack
Brute force attack stopped by firewall
2019-07-08 15:22:40
177.129.206.227 attackbotsspam
Brute force attack stopped by firewall
2019-07-08 16:00:18
191.53.197.81 attack
Brute force attack stopped by firewall
2019-07-08 15:58:23
168.228.151.37 attack
Brute force attack stopped by firewall
2019-07-08 15:29:25
189.51.103.38 attack
Brute force attack stopped by firewall
2019-07-08 15:32:12
177.66.226.125 attackbotsspam
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-08 15:37:20
92.222.155.168 attackbotsspam
Unauthorized IMAP connection attempt.
2019-07-08 15:17:49
200.66.113.228 attack
Brute force attack stopped by firewall
2019-07-08 15:29:48
185.176.27.54 attack
08.07.2019 06:23:28 Connection to port 18099 blocked by firewall
2019-07-08 15:24:30
185.234.216.180 attackspambots
Brute force attack stopped by firewall
2019-07-08 16:09:02
191.53.199.106 attackspam
Brute force attack stopped by firewall
2019-07-08 16:03:43
116.236.180.211 attack
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-08 15:45:46
218.92.0.176 attackspam
[portscan] tcp/22 [SSH]
*(RWIN=65535)(07081017)
2019-07-08 16:10:08
212.129.60.155 attackspam
firewall-block_invalid_GET_Request
2019-07-08 16:04:40
177.130.136.79 attackspam
SMTP Fraud Orders
2019-07-08 16:07:30

Recently Reported IPs

104.21.49.226 104.21.49.233 104.21.49.239 104.21.49.240
104.21.49.241 201.215.241.75 104.21.49.245 104.21.49.248
205.190.167.152 104.21.49.250 104.21.49.26 104.21.49.32
104.21.49.35 104.21.49.42 104.21.49.43 104.21.49.45
104.21.49.47 116.52.165.135 104.21.49.49 104.21.49.52