Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.5.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.5.96.			IN	A

;; AUTHORITY SECTION:
.			123	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 23:29:03 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 96.5.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 96.5.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.65.242.16 attackbots
Invalid user admin from 159.65.242.16 port 35222
2019-06-22 22:04:20
152.246.225.130 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-06-22 21:08:26
103.229.72.72 attackbotsspam
proto=tcp  .  spt=39098  .  dpt=25  .     (listed on Blocklist de  Jun 21)     (186)
2019-06-22 21:19:09
113.4.101.64 attack
Port scan on 1 port(s): 3389
2019-06-22 21:30:45
89.250.17.192 attackbotsspam
proto=tcp  .  spt=45746  .  dpt=25  .     (listed on Blocklist de  Jun 21)     (183)
2019-06-22 21:23:49
85.172.126.110 attackspam
proto=tcp  .  spt=57797  .  dpt=25  .     (listed on Blocklist de  Jun 21)     (190)
2019-06-22 21:13:46
209.107.216.89 attack
NAME : SECUREDCONNECTIVITY-209-107-216-0-24 CIDR : 209.107.216.0/24 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Texas - block certain countries :) IP: 209.107.216.89  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 21:34:58
45.56.173.25 attackspam
Chat Spam
2019-06-22 21:33:50
119.4.40.101 attackspam
Jun 21 23:14:45 aat-srv002 sshd[18716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.40.101
Jun 21 23:14:47 aat-srv002 sshd[18716]: Failed password for invalid user admin1 from 119.4.40.101 port 36735 ssh2
Jun 21 23:16:28 aat-srv002 sshd[18733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.40.101
Jun 21 23:16:30 aat-srv002 sshd[18733]: Failed password for invalid user fei from 119.4.40.101 port 54521 ssh2
...
2019-06-22 21:26:37
85.111.25.113 attackspam
Brute force attempt
2019-06-22 22:07:37
85.105.22.199 attackbots
19/6/22@00:15:00: FAIL: Alarm-Intrusion address from=85.105.22.199
...
2019-06-22 21:53:55
41.206.62.174 attackspambots
proto=tcp  .  spt=40762  .  dpt=25  .     (listed on Blocklist de  Jun 21)     (184)
2019-06-22 21:23:24
37.208.66.215 attackspambots
[portscan] Port scan
2019-06-22 21:34:15
43.240.103.186 attack
Unauthorised access (Jun 22) SRC=43.240.103.186 LEN=52 TTL=115 ID=1319 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-22 20:51:40
103.245.71.160 attackbots
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-22 06:16:49]
2019-06-22 20:51:06

Recently Reported IPs

104.21.5.95 161.21.121.94 104.21.5.98 104.21.5.99
104.21.50.103 104.21.50.111 104.21.50.112 104.21.50.113
104.21.50.115 104.21.50.116 104.21.50.120 104.21.50.121
104.21.50.128 43.61.193.236 104.21.50.129 104.21.50.135
104.21.50.138 104.21.50.141 104.21.50.142 104.21.50.143