Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.52.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59193
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.52.14.			IN	A

;; AUTHORITY SECTION:
.			453	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:35:39 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 14.52.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.52.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.171.73.84 attack
(imapd) Failed IMAP login from 202.171.73.84 (NC/New Caledonia/202-171-73-84.h10.canl.nc): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 26 16:30:19 ir1 dovecot[264309]: imap-login: Disconnected (auth failed, 1 attempts in 9 secs): user=, method=PLAIN, rip=202.171.73.84, lip=5.63.12.44, TLS, session=
2020-04-27 01:35:24
209.141.55.11 attackbots
(sshd) Failed SSH login from 209.141.55.11 (US/United States/not.a.sb.co): 10 in the last 3600 secs
2020-04-27 01:23:42
156.96.119.148 attackbotsspam
firewall-block, port(s): 100/tcp, 886/tcp, 1000/tcp, 3060/tcp, 3070/tcp, 6201/tcp, 7015/tcp, 7016/tcp, 7201/tcp, 8070/tcp, 8182/tcp, 8409/tcp, 8809/tcp, 8880/tcp, 8884/tcp, 9007/tcp, 9060/tcp, 9070/tcp, 9090/tcp, 9123/tcp, 9898/tcp, 9990/tcp, 9998/tcp, 10001/tcp
2020-04-27 01:50:35
109.252.90.69 attack
Unauthorized connection attempt from IP address 109.252.90.69 on Port 445(SMB)
2020-04-27 01:43:59
211.145.49.129 attack
Apr 26 17:18:58 scw-6657dc sshd[7724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.145.49.129
Apr 26 17:18:58 scw-6657dc sshd[7724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.145.49.129
Apr 26 17:19:00 scw-6657dc sshd[7724]: Failed password for invalid user vnc from 211.145.49.129 port 28553 ssh2
...
2020-04-27 01:36:32
87.246.7.29 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 87.246.7.29 (BG/Bulgaria/29.0-255.7.246.87.in-addr.arpa): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-26 20:48:01 login authenticator failed for (KbDFFGe04) [87.246.7.29]: 535 Incorrect authentication data (set_id=sales@b-s-pipe.com)
2020-04-27 01:54:21
222.223.174.216 attack
Time:     Sun Apr 26 08:30:43 2020 -0300
IP:       222.223.174.216 (CN/China/216.174.223.222.broad.zj.he.dynamic.163data.com.cn)
Failures: 20 (WordPressBruteForcePOST)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-04-27 01:49:04
203.114.244.10 attackspam
Icarus honeypot on github
2020-04-27 01:30:13
202.165.33.109 attackspam
Unauthorized connection attempt from IP address 202.165.33.109 on Port 445(SMB)
2020-04-27 01:38:37
36.67.248.206 attack
Apr 26 11:56:53 124388 sshd[20404]: Invalid user extrim from 36.67.248.206 port 50942
Apr 26 11:56:53 124388 sshd[20404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.248.206
Apr 26 11:56:53 124388 sshd[20404]: Invalid user extrim from 36.67.248.206 port 50942
Apr 26 11:56:55 124388 sshd[20404]: Failed password for invalid user extrim from 36.67.248.206 port 50942 ssh2
Apr 26 12:00:30 124388 sshd[20563]: Invalid user xulei from 36.67.248.206 port 40470
2020-04-27 01:26:14
193.82.253.203 attackspam
Apr 26 12:00:20 hermescis postfix/smtpd[26171]: NOQUEUE: reject: RCPT from 193-82-253-203.tpgi.com.au[193.82.253.203]: 550 5.1.1 : Recipient address rejected:* from= to= proto=ESMTP helo=<193-82-253-203.tpgi.com.au>
2020-04-27 01:28:26
41.139.171.137 attackbots
(imapd) Failed IMAP login from 41.139.171.137 (KE/Kenya/41-139-171-137.safaricombusiness.co.ke): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 26 16:30:00 ir1 dovecot[264309]: imap-login: Disconnected (auth failed, 1 attempts in 4 secs): user=, method=PLAIN, rip=41.139.171.137, lip=5.63.12.44, TLS, session=<1O1HVjCk784pi6uJ>
2020-04-27 01:56:53
111.67.196.5 attackbotsspam
SSH brute-force: detected 9 distinct usernames within a 24-hour window.
2020-04-27 01:37:38
158.69.172.225 attackbots
Automatic report - Banned IP Access
2020-04-27 01:41:03
181.112.155.197 attackspambots
Unauthorized connection attempt from IP address 181.112.155.197 on Port 445(SMB)
2020-04-27 01:13:16

Recently Reported IPs

104.21.7.228 104.21.52.151 104.21.52.16 104.21.52.162
104.21.52.157 104.21.52.167 104.21.52.178 104.21.52.171
104.21.7.229 104.21.52.18 104.21.52.176 104.21.52.179
104.21.52.173 104.21.52.185 104.21.52.182 104.21.52.180
104.21.52.187 104.21.52.192 104.21.52.190 104.21.52.191