Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.59.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.59.103.			IN	A

;; AUTHORITY SECTION:
.			248	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 00:46:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 103.59.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.59.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.221.112.45 attackbotsspam
SASL broute force
2019-12-27 17:26:23
163.172.60.213 attackbotsspam
fail2ban honeypot
2019-12-27 17:13:31
134.209.98.170 attack
TCP Port Scanning
2019-12-27 17:38:15
205.185.123.237 attackspam
Bruteforce on SSH Honeypot
2019-12-27 17:18:29
118.24.114.205 attack
Dec 27 07:27:53 localhost sshd\[17628\]: Invalid user smokey from 118.24.114.205 port 42200
Dec 27 07:27:53 localhost sshd\[17628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.114.205
Dec 27 07:27:55 localhost sshd\[17628\]: Failed password for invalid user smokey from 118.24.114.205 port 42200 ssh2
2019-12-27 17:05:56
212.232.40.60 attack
Automatic report - Port Scan Attack
2019-12-27 17:33:17
106.54.198.161 attackspambots
Dec 27 03:57:53 plusreed sshd[28422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.198.161  user=root
Dec 27 03:57:55 plusreed sshd[28422]: Failed password for root from 106.54.198.161 port 54830 ssh2
...
2019-12-27 16:59:58
18.189.30.30 attackbotsspam
(From krista.sipes@msn.com) Do you want to post your advertisement on over 1000 ad sites every month? One tiny investment every month will get you virtually unlimited traffic to your site forever! Get more info by visiting: http://www.postyouradsontonsofsites.xyz
2019-12-27 17:32:04
23.251.42.5 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-12-27 17:34:39
89.36.220.145 attackspam
Automatic report - Banned IP Access
2019-12-27 17:35:45
185.98.24.194 attackbotsspam
Host Scan
2019-12-27 17:32:52
180.246.148.243 attackbotsspam
Unauthorized connection attempt detected from IP address 180.246.148.243 to port 445
2019-12-27 17:24:03
128.199.219.181 attackspambots
Invalid user ocie from 128.199.219.181 port 39142
2019-12-27 17:15:11
182.61.21.155 attackspambots
Automatic report - Banned IP Access
2019-12-27 17:21:10
122.54.139.17 attack
Host Scan
2019-12-27 17:14:06

Recently Reported IPs

104.21.59.100 104.21.59.110 104.21.59.112 102.136.9.210
104.21.59.113 104.21.59.114 108.158.186.9 104.21.59.115
42.238.247.58 104.21.59.117 104.21.59.122 104.21.59.124
248.69.240.196 104.21.59.125 203.50.219.115 104.21.59.127
104.21.59.13 104.21.59.131 104.21.59.132 104.21.59.133