Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.50.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24301
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.50.172.			IN	A

;; AUTHORITY SECTION:
.			450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:34:12 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 172.50.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.50.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.113.27.109 attackbots
Apr 17 21:22:15 host proftpd[19904]: 0.0.0.0 (180.113.27.109[180.113.27.109]) - USER anonymous: no such user found from 180.113.27.109 [180.113.27.109] to 163.172.107.87:21
...
2020-04-18 05:35:43
162.243.131.55 attackbots
GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak
2020-04-18 06:11:26
129.211.111.239 attack
Apr 17 22:24:37 server sshd[5739]: Failed password for invalid user ef from 129.211.111.239 port 55774 ssh2
Apr 17 22:30:20 server sshd[6705]: Failed password for invalid user space from 129.211.111.239 port 34856 ssh2
Apr 17 22:35:54 server sshd[7608]: Failed password for root from 129.211.111.239 port 42144 ssh2
2020-04-18 05:57:00
106.52.114.166 attackspambots
Invalid user craft from 106.52.114.166 port 48610
2020-04-18 06:00:56
74.82.47.3 attackspam
Port Scan: Events[1] countPorts[1]: 8443 ..
2020-04-18 06:01:26
40.89.172.9 attack
SSH Invalid Login
2020-04-18 05:57:19
106.12.70.112 attack
SSH Invalid Login
2020-04-18 05:54:22
217.61.56.50 attackspam
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=217.61.56.50
2020-04-18 06:04:56
14.187.28.214 attack
2020-04-17 21:04:03 plain_virtual_exim authenticator failed for ([127.0.0.1]) [14.187.28.214]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.187.28.214
2020-04-18 06:10:15
81.28.100.155 attackbots
Apr 17 21:21:14  exim[25521]: [1\47] 1jPWY5-0006dd-Gn H=(command.atalizinq.com) [81.28.100.155] F= rejected after DATA: This message scored 104.4 spam points.
2020-04-18 05:51:42
182.43.215.50 attackbots
Unauthorized SSH login attempts
2020-04-18 06:07:03
106.12.210.166 attackspam
" "
2020-04-18 05:52:20
197.249.44.195 attack
Invalid user user1 from 197.249.44.195 port 56074
2020-04-18 05:50:16
185.173.35.13 attack
scan r
2020-04-18 06:12:46
104.140.188.58 attackbotsspam
Port Scan: Events[1] countPorts[1]: 1433 ..
2020-04-18 05:43:54

Recently Reported IPs

104.21.50.136 104.21.50.16 104.21.50.105 104.18.24.108
104.21.50.193 104.21.50.178 104.21.50.173 104.18.24.12
245.32.29.6 104.18.3.123 104.21.52.204 104.21.52.156
104.21.52.232 104.21.52.231 104.21.52.144 104.21.52.238
104.21.52.218 104.21.52.116 104.21.52.136 104.21.52.224