Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.5.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.5.247.			IN	A

;; AUTHORITY SECTION:
.			14	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:12:01 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 247.5.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 247.5.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
156.209.80.56 attackspam
Invalid user admin from 156.209.80.56 port 51873
2019-10-20 02:58:36
202.137.155.203 attack
Invalid user system from 202.137.155.203 port 48554
2019-10-20 02:46:39
139.190.201.237 attackspam
Invalid user admin from 139.190.201.237 port 36658
2019-10-20 03:00:02
113.172.244.105 attackbotsspam
Invalid user admin from 113.172.244.105 port 53321
2019-10-20 03:04:51
120.136.167.74 attack
Brute force attempt
2019-10-20 03:01:44
114.242.245.32 attackbots
Invalid user ftpuser2 from 114.242.245.32 port 25090
2019-10-20 02:30:54
37.59.38.137 attackbots
Oct 19 15:55:59 pkdns2 sshd\[24008\]: Invalid user lan from 37.59.38.137Oct 19 15:56:01 pkdns2 sshd\[24008\]: Failed password for invalid user lan from 37.59.38.137 port 41974 ssh2Oct 19 16:00:09 pkdns2 sshd\[24225\]: Invalid user jerusa from 37.59.38.137Oct 19 16:00:11 pkdns2 sshd\[24225\]: Failed password for invalid user jerusa from 37.59.38.137 port 33470 ssh2Oct 19 16:04:22 pkdns2 sshd\[24358\]: Invalid user toxic from 37.59.38.137Oct 19 16:04:23 pkdns2 sshd\[24358\]: Failed password for invalid user toxic from 37.59.38.137 port 53210 ssh2
...
2019-10-20 02:41:48
197.56.82.87 attack
Invalid user admin from 197.56.82.87 port 51493
2019-10-20 02:49:10
123.16.151.89 attackbotsspam
Invalid user admin from 123.16.151.89 port 41345
2019-10-20 03:01:15
52.176.110.203 attackbots
Failed password for invalid user on ssh2
2019-10-20 02:38:56
103.60.126.65 attack
Invalid user employer from 103.60.126.65 port 52327
2019-10-20 02:32:47
195.16.41.170 attackspam
Unauthorized SSH login attempts
2019-10-20 02:50:40
168.228.197.25 attackbotsspam
Invalid user admin from 168.228.197.25 port 48283
2019-10-20 02:57:27
93.171.141.141 attack
Oct 19 18:59:41 dev0-dcde-rnet sshd[6045]: Failed password for root from 93.171.141.141 port 56800 ssh2
Oct 19 19:03:37 dev0-dcde-rnet sshd[6057]: Failed password for root from 93.171.141.141 port 40340 ssh2
2019-10-20 02:33:54
218.92.0.184 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Failed password for root from 218.92.0.184 port 44987 ssh2
Failed password for root from 218.92.0.184 port 44987 ssh2
Failed password for root from 218.92.0.184 port 44987 ssh2
Failed password for root from 218.92.0.184 port 44987 ssh2
2019-10-20 02:46:26

Recently Reported IPs

104.21.5.227 104.21.5.223 104.21.5.241 104.21.5.25
104.21.5.43 104.21.5.3 104.21.5.53 104.21.5.34
104.21.5.6 104.21.5.248 13.225.71.25 104.21.50.10
104.21.5.90 104.21.5.77 104.21.50.106 104.21.50.108
104.21.50.110 104.21.50.164 104.21.50.17 104.21.50.169