Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.5.110
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.5.110.			IN	A

;; AUTHORITY SECTION:
.			200	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 23:19:29 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 110.5.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 110.5.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.17.106.65 attack
187.17.106.65 - - [31/Mar/2020:23:29:28 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
187.17.106.65 - - [31/Mar/2020:23:29:32 +0200] "POST /wp-login.php HTTP/1.1" 200 6601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
187.17.106.65 - - [31/Mar/2020:23:29:33 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-01 08:19:33
110.78.208.12 attackspambots
Brute force SMTP login attempted.
...
2020-04-01 08:14:36
45.184.225.2 attackbotsspam
Mar 31 23:54:56 localhost sshd[51155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.225.2  user=root
Mar 31 23:54:58 localhost sshd[51155]: Failed password for root from 45.184.225.2 port 33908 ssh2
Mar 31 23:58:22 localhost sshd[51532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.225.2  user=root
Mar 31 23:58:24 localhost sshd[51532]: Failed password for root from 45.184.225.2 port 48458 ssh2
Apr  1 00:01:57 localhost sshd[52175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.225.2  user=root
Apr  1 00:01:59 localhost sshd[52175]: Failed password for root from 45.184.225.2 port 35401 ssh2
...
2020-04-01 08:12:29
51.75.202.218 attackspam
2020-04-01T01:22:43.956600jannga.de sshd[29930]: Invalid user history from 51.75.202.218 port 36554
2020-04-01T01:22:46.089801jannga.de sshd[29930]: Failed password for invalid user history from 51.75.202.218 port 36554 ssh2
...
2020-04-01 08:27:39
103.100.211.119 attackbots
Apr  1 01:44:20 vps sshd[843488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.211.119  user=root
Apr  1 01:44:22 vps sshd[843488]: Failed password for root from 103.100.211.119 port 58719 ssh2
Apr  1 01:48:34 vps sshd[866372]: Invalid user so from 103.100.211.119 port 36966
Apr  1 01:48:34 vps sshd[866372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.211.119
Apr  1 01:48:36 vps sshd[866372]: Failed password for invalid user so from 103.100.211.119 port 36966 ssh2
...
2020-04-01 07:55:15
110.93.91.95 attackspam
Brute force SMTP login attempted.
...
2020-04-01 08:02:00
118.97.213.194 attackspam
SSH Login Bruteforce
2020-04-01 08:06:29
103.45.106.55 attack
$f2bV_matches
2020-04-01 07:50:43
92.118.38.82 attackspambots
Apr  1 01:54:35 v22019058497090703 postfix/smtpd[15454]: warning: unknown[92.118.38.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  1 01:55:08 v22019058497090703 postfix/smtpd[15454]: warning: unknown[92.118.38.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  1 01:55:41 v22019058497090703 postfix/smtpd[15454]: warning: unknown[92.118.38.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-01 07:56:22
222.186.30.76 attack
2020-03-31T23:57:44.911320abusebot.cloudsearch.cf sshd[8961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
2020-03-31T23:57:46.799506abusebot.cloudsearch.cf sshd[8961]: Failed password for root from 222.186.30.76 port 34862 ssh2
2020-03-31T23:57:48.768585abusebot.cloudsearch.cf sshd[8961]: Failed password for root from 222.186.30.76 port 34862 ssh2
2020-03-31T23:57:44.911320abusebot.cloudsearch.cf sshd[8961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
2020-03-31T23:57:46.799506abusebot.cloudsearch.cf sshd[8961]: Failed password for root from 222.186.30.76 port 34862 ssh2
2020-03-31T23:57:48.768585abusebot.cloudsearch.cf sshd[8961]: Failed password for root from 222.186.30.76 port 34862 ssh2
2020-03-31T23:57:44.911320abusebot.cloudsearch.cf sshd[8961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.7
...
2020-04-01 08:09:10
134.209.226.157 attackbots
Apr  1 01:18:58 server sshd[53483]: Failed password for root from 134.209.226.157 port 54068 ssh2
Apr  1 01:22:47 server sshd[54675]: Failed password for invalid user yamaken from 134.209.226.157 port 37884 ssh2
Apr  1 01:26:23 server sshd[55634]: Failed password for invalid user user from 134.209.226.157 port 49934 ssh2
2020-04-01 07:57:56
200.149.231.50 attackbotsspam
Mar 31 23:27:25 sip sshd[21623]: Failed password for root from 200.149.231.50 port 54286 ssh2
Mar 31 23:29:09 sip sshd[22050]: Failed password for root from 200.149.231.50 port 45306 ssh2
2020-04-01 07:52:17
121.122.97.162 attack
Telnetd brute force attack detected by fail2ban
2020-04-01 08:01:31
111.11.195.104 attackspam
Brute force SMTP login attempted.
...
2020-04-01 07:53:53
111.10.43.244 attackbots
Brute force SMTP login attempted.
...
2020-04-01 07:58:27

Recently Reported IPs

104.21.5.11 104.21.5.116 104.21.5.117 104.21.5.119
104.21.5.12 104.21.5.120 104.21.5.122 104.21.5.124
104.21.5.125 104.21.5.127 104.21.5.129 104.21.5.13
104.21.5.136 104.21.5.137 100.67.27.116 104.21.5.139
104.21.5.140 104.21.5.142 104.21.5.146 104.21.5.147