Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.61.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35523
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.61.234.			IN	A

;; AUTHORITY SECTION:
.			115	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 137 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 05:24:42 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 234.61.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.61.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.112.27.92 attackbots
Jun 21 23:09:08 yabzik sshd[19175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.27.92
Jun 21 23:09:10 yabzik sshd[19175]: Failed password for invalid user kun from 193.112.27.92 port 52516 ssh2
Jun 21 23:10:36 yabzik sshd[19779]: Failed password for root from 193.112.27.92 port 37838 ssh2
2019-06-22 04:40:01
139.199.133.222 attackbotsspam
Jun 21 21:42:30 mail1 sshd\[27507\]: Invalid user zhuang from 139.199.133.222 port 37772
Jun 21 21:42:30 mail1 sshd\[27507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.133.222
Jun 21 21:42:31 mail1 sshd\[27507\]: Failed password for invalid user zhuang from 139.199.133.222 port 37772 ssh2
Jun 21 21:45:57 mail1 sshd\[29161\]: Invalid user tester from 139.199.133.222 port 43510
Jun 21 21:45:57 mail1 sshd\[29161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.133.222
...
2019-06-22 05:01:46
45.55.170.158 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 05:15:44
154.223.171.112 attackbotsspam
445/tcp
[2019-06-21]1pkt
2019-06-22 04:41:58
222.160.218.129 attackbots
5500/tcp
[2019-06-21]1pkt
2019-06-22 04:56:05
175.157.40.173 attack
utm - spam
2019-06-22 05:19:54
51.158.102.153 attack
Request: "GET /xmlrpc.php HTTP/1.1"
2019-06-22 05:12:11
130.0.29.77 attack
Request: "GET / HTTP/1.1"
2019-06-22 05:09:02
103.91.54.100 attack
SSH bruteforce
2019-06-22 04:37:46
89.44.202.182 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 04:54:24
185.255.47.201 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 04:49:30
91.185.1.70 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 05:00:16
209.17.97.90 attack
Portscan or hack attempt detected by psad/fwsnort
2019-06-22 05:17:49
118.89.229.244 attack
Jun 21 21:45:39 vps647732 sshd[17284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.244
Jun 21 21:45:40 vps647732 sshd[17284]: Failed password for invalid user pie from 118.89.229.244 port 39328 ssh2
...
2019-06-22 05:14:43
171.22.9.29 attackbots
5555/tcp
[2019-06-21]1pkt
2019-06-22 05:08:12

Recently Reported IPs

104.21.64.4 104.21.61.180 104.21.61.191 104.21.66.104
104.21.66.169 104.21.65.130 104.21.67.194 104.21.65.69
104.21.66.153 104.21.65.234 104.21.68.243 104.21.66.239
104.21.68.176 104.21.7.132 104.21.7.193 104.21.7.20
104.21.7.21 104.21.7.119 104.21.7.130 104.21.7.192