Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.58.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.58.240.			IN	A

;; AUTHORITY SECTION:
.			548	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 00:42:41 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 240.58.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 240.58.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.25.104.48 attackspam
Jun 29 21:12:50 DAAP sshd[17741]: Invalid user xcy from 118.25.104.48 port 52262
Jun 29 21:12:50 DAAP sshd[17741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.104.48
Jun 29 21:12:50 DAAP sshd[17741]: Invalid user xcy from 118.25.104.48 port 52262
Jun 29 21:12:52 DAAP sshd[17741]: Failed password for invalid user xcy from 118.25.104.48 port 52262 ssh2
Jun 29 21:16:52 DAAP sshd[17777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.104.48  user=root
Jun 29 21:16:54 DAAP sshd[17777]: Failed password for root from 118.25.104.48 port 12061 ssh2
...
2020-07-01 22:09:52
51.91.123.119 attackspambots
Jun 30 22:36:41 ift sshd\[39407\]: Invalid user wx from 51.91.123.119Jun 30 22:36:43 ift sshd\[39407\]: Failed password for invalid user wx from 51.91.123.119 port 49902 ssh2Jun 30 22:40:29 ift sshd\[39984\]: Invalid user steven from 51.91.123.119Jun 30 22:40:31 ift sshd\[39984\]: Failed password for invalid user steven from 51.91.123.119 port 48510 ssh2Jun 30 22:44:28 ift sshd\[40293\]: Failed password for root from 51.91.123.119 port 47090 ssh2
...
2020-07-01 21:26:45
148.251.123.46 attackspam
Bad web bot already banned
2020-07-01 22:20:03
186.10.125.209 attackspam
SSH Brute Force
2020-07-01 21:50:50
132.232.79.135 attackspam
2020-06-30T14:38:04.5272931495-001 sshd[55207]: Invalid user laravel from 132.232.79.135 port 43124
2020-06-30T14:38:06.9227061495-001 sshd[55207]: Failed password for invalid user laravel from 132.232.79.135 port 43124 ssh2
2020-06-30T14:41:40.3689081495-001 sshd[55399]: Invalid user postgres from 132.232.79.135 port 40974
2020-06-30T14:41:40.3719961495-001 sshd[55399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.79.135
2020-06-30T14:41:40.3689081495-001 sshd[55399]: Invalid user postgres from 132.232.79.135 port 40974
2020-06-30T14:41:42.0815581495-001 sshd[55399]: Failed password for invalid user postgres from 132.232.79.135 port 40974 ssh2
...
2020-07-01 21:47:32
210.14.77.102 attack
2020-06-30T19:57:43.878947hostname sshd[19045]: Invalid user mike from 210.14.77.102 port 15720
2020-06-30T19:57:46.178076hostname sshd[19045]: Failed password for invalid user mike from 210.14.77.102 port 15720 ssh2
2020-06-30T20:07:28.520163hostname sshd[23179]: Invalid user shan from 210.14.77.102 port 64603
...
2020-07-01 21:58:36
189.63.8.60 attackbots
$f2bV_matches
2020-07-01 21:27:19
85.105.230.81 attackbotsspam
Unauthorized connection attempt detected from IP address 85.105.230.81 to port 23
2020-07-01 21:42:35
217.182.253.249 attackspambots
$f2bV_matches
2020-07-01 22:07:38
52.187.76.241 attack
2020-06-30T13:54:01.635241linuxbox-skyline sshd[406069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.76.241  user=root
2020-06-30T13:54:03.626023linuxbox-skyline sshd[406069]: Failed password for root from 52.187.76.241 port 49761 ssh2
...
2020-07-01 22:07:01
51.178.87.42 attackspam
...
2020-07-01 22:13:42
111.231.119.188 attack
$f2bV_matches
2020-07-01 22:00:06
192.99.11.195 attackspambots
2020-06-30T15:33:21.122603na-vps210223 sshd[477]: Invalid user chat from 192.99.11.195 port 48973
2020-06-30T15:33:22.888045na-vps210223 sshd[477]: Failed password for invalid user chat from 192.99.11.195 port 48973 ssh2
2020-06-30T15:36:12.100716na-vps210223 sshd[8477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=shinracorp.fr  user=root
2020-06-30T15:36:14.668009na-vps210223 sshd[8477]: Failed password for root from 192.99.11.195 port 47821 ssh2
2020-06-30T15:39:22.259890na-vps210223 sshd[17180]: Invalid user dl from 192.99.11.195 port 46696
...
2020-07-01 21:48:11
79.125.183.146 attackspam
Unauthorized SSH login attempts
2020-07-01 22:10:45
157.245.142.218 attackbots
k+ssh-bruteforce
2020-07-01 22:06:00

Recently Reported IPs

161.238.226.249 104.21.58.242 104.21.58.243 104.21.58.244
104.21.58.246 104.21.58.248 104.21.58.25 21.22.89.40
104.21.58.251 104.21.58.252 59.224.228.145 104.21.58.253
104.21.58.26 104.21.58.28 104.21.58.29 104.21.58.31
104.21.58.39 104.21.58.40 104.21.58.42 104.21.58.43