Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.52.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.52.111.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:35:34 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 111.52.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.52.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
83.26.123.51 attack
Automatic report - Port Scan Attack
2019-07-16 06:45:54
80.232.171.219 attackbots
Automatic report - Port Scan Attack
2019-07-16 06:57:37
51.68.81.112 attackspam
Jul 16 00:43:32 eventyay sshd[3455]: Failed password for root from 51.68.81.112 port 37946 ssh2
Jul 16 00:48:14 eventyay sshd[4688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.81.112
Jul 16 00:48:16 eventyay sshd[4688]: Failed password for invalid user test from 51.68.81.112 port 37224 ssh2
...
2019-07-16 06:55:35
158.69.212.107 attack
WordPress login Brute force / Web App Attack on client site.
2019-07-16 06:23:26
123.16.53.64 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 15:26:37,721 INFO [amun_request_handler] PortScan Detected on Port: 445 (123.16.53.64)
2019-07-16 07:10:59
47.104.226.128 attackspambots
Looking for resource vulnerabilities
2019-07-16 06:31:36
37.29.69.75 attackspam
23/tcp 23/tcp 23/tcp
[2019-06-09/07-15]3pkt
2019-07-16 06:49:26
177.102.18.62 attack
445/tcp 445/tcp 445/tcp
[2019-05-28/07-15]3pkt
2019-07-16 07:03:19
101.95.173.34 attackbots
Unauthorized connection attempt from IP address 101.95.173.34 on Port 445(SMB)
2019-07-16 07:08:43
104.144.45.176 attack
(From webmasterdesigners4u@gmail.com) Hello,

I have run some diagnostic tools on your website and saw immediately that there is plenty of room for improvement. With a few upgrades on your existing platform, your website can start generating more sales, leads, and more business. Your website is your most important digital asset out on the Web, and it's time that it got the upgrade that it sorely needs. 

Search engines like Google have a way of accessing websites to look for certain keywords and elements that will highlight what your site is all about. I specialize in making sure that search algorithms find what they need on your website to put it on top of the search results.

I'll be glad to give you more detailed information about how you can make your website more profitable and what the results will be during a free consultation. Kindly reply to let me know when's the best time to give in touch with you if you're interested. I look forward to hearing back from you.

- Mario Ferguson
2019-07-16 06:57:19
95.31.169.249 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 15:27:34,894 INFO [amun_request_handler] PortScan Detected on Port: 445 (95.31.169.249)
2019-07-16 07:04:10
107.170.251.238 attackspam
firewall-block, port(s): 2376/tcp
2019-07-16 07:03:42
91.134.120.5 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-16 06:52:39
207.154.239.128 attack
Jul 16 04:21:14 vibhu-HP-Z238-Microtower-Workstation sshd\[7623\]: Invalid user ftpadmin from 207.154.239.128
Jul 16 04:21:14 vibhu-HP-Z238-Microtower-Workstation sshd\[7623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.239.128
Jul 16 04:21:16 vibhu-HP-Z238-Microtower-Workstation sshd\[7623\]: Failed password for invalid user ftpadmin from 207.154.239.128 port 54764 ssh2
Jul 16 04:25:50 vibhu-HP-Z238-Microtower-Workstation sshd\[8594\]: Invalid user informix from 207.154.239.128
Jul 16 04:25:50 vibhu-HP-Z238-Microtower-Workstation sshd\[8594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.239.128
...
2019-07-16 07:00:27
197.248.38.174 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-17/07-15]11pkt,1pt.(tcp)
2019-07-16 06:35:15

Recently Reported IPs

104.21.52.12 104.21.52.120 104.21.52.122 104.21.52.125
104.21.52.127 104.21.52.132 104.21.52.133 104.21.52.138
104.21.52.124 104.21.52.15 104.21.7.228 104.21.52.14
104.21.52.151 104.21.52.16 104.21.52.162 104.21.52.157
104.21.52.167 104.21.52.178 104.21.52.171 104.21.7.229