Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.62.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14230
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.62.244.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:42:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 244.62.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.62.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.68.120.181 attackspambots
2020-08-04T17:25:18+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-08-05 00:29:39
142.93.122.207 attackbots
142.93.122.207 - - [04/Aug/2020:13:11:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2420 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.122.207 - - [04/Aug/2020:13:11:52 +0100] "POST /wp-login.php HTTP/1.1" 200 2393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.122.207 - - [04/Aug/2020:13:11:54 +0100] "POST /wp-login.php HTTP/1.1" 200 2425 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-05 00:45:23
190.215.112.122 attackspambots
Aug  4 17:27:19 rocket sshd[25820]: Failed password for root from 190.215.112.122 port 33145 ssh2
Aug  4 17:32:30 rocket sshd[26475]: Failed password for root from 190.215.112.122 port 38528 ssh2
...
2020-08-05 00:43:48
106.110.235.6 attackbots
20 attempts against mh-ssh on field
2020-08-05 00:54:05
106.52.130.172 attackbotsspam
Aug  4 09:14:43 game-panel sshd[19476]: Failed password for root from 106.52.130.172 port 38212 ssh2
Aug  4 09:17:39 game-panel sshd[19638]: Failed password for root from 106.52.130.172 port 44246 ssh2
2020-08-05 00:33:14
42.200.78.78 attack
Aug  4 08:51:09 master sshd[15920]: Failed password for root from 42.200.78.78 port 37558 ssh2
Aug  4 09:06:30 master sshd[16648]: Failed password for root from 42.200.78.78 port 55604 ssh2
Aug  4 09:10:49 master sshd[16814]: Failed password for root from 42.200.78.78 port 38504 ssh2
Aug  4 09:15:13 master sshd[16913]: Failed password for root from 42.200.78.78 port 49632 ssh2
Aug  4 09:19:42 master sshd[16968]: Failed password for root from 42.200.78.78 port 60762 ssh2
Aug  4 09:23:59 master sshd[17091]: Failed password for root from 42.200.78.78 port 43662 ssh2
Aug  4 09:28:12 master sshd[17176]: Failed password for root from 42.200.78.78 port 54794 ssh2
Aug  4 09:32:32 master sshd[17646]: Failed password for root from 42.200.78.78 port 37698 ssh2
Aug  4 09:36:54 master sshd[17732]: Failed password for root from 42.200.78.78 port 48828 ssh2
Aug  4 09:41:22 master sshd[17887]: Failed password for root from 42.200.78.78 port 59960 ssh2
2020-08-05 00:24:36
122.255.30.30 attack
(sshd) Failed SSH login from 122.255.30.30 (LK/Sri Lanka/mail.gallefacehotel.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  4 15:09:08 s1 sshd[28424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.255.30.30  user=root
Aug  4 15:09:10 s1 sshd[28424]: Failed password for root from 122.255.30.30 port 50000 ssh2
Aug  4 15:36:57 s1 sshd[29364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.255.30.30  user=root
Aug  4 15:36:59 s1 sshd[29364]: Failed password for root from 122.255.30.30 port 44217 ssh2
Aug  4 15:53:31 s1 sshd[30007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.255.30.30  user=root
2020-08-05 00:42:03
220.112.50.249 attack
Aug  4 09:12:52 XXX sshd[15892]: Invalid user admin from 220.112.50.249
Aug  4 09:12:53 XXX sshd[15892]: Received disconnect from 220.112.50.249: 11: Bye Bye [preauth]
Aug  4 09:13:14 XXX sshd[15896]: Invalid user admin from 220.112.50.249
Aug  4 09:13:14 XXX sshd[15896]: Received disconnect from 220.112.50.249: 11: Bye Bye [preauth]
Aug  4 09:13:37 XXX sshd[15923]: Invalid user admin from 220.112.50.249
Aug  4 09:13:37 XXX sshd[15923]: Received disconnect from 220.112.50.249: 11: Bye Bye [preauth]
Aug  4 09:13:58 XXX sshd[16108]: Invalid user admin from 220.112.50.249
Aug  4 09:13:59 XXX sshd[16108]: Received disconnect from 220.112.50.249: 11: Bye Bye [preauth]
Aug  4 09:14:20 XXX sshd[16112]: Invalid user admin from 220.112.50.249
Aug  4 09:14:20 XXX sshd[16112]: Received disconnect from 220.112.50.249: 11: Bye Bye [preauth]
Aug  4 09:14:41 XXX sshd[16127]: Invalid user admin from 220.112.50.249
Aug  4 09:14:42 XXX sshd[16127]: Received disconnect from 220.112.50.249........
-------------------------------
2020-08-05 00:14:35
45.61.142.93 attack
45.61.142.93 - - [04/Aug/2020:05:20:31 -0400] "GET /welcome/images/about.png HTTP/1.1" 304 - "https://ghostgamingvpn.io/welcome/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36"
45.61.142.93 - - [04/Aug/2020:05:20:31 -0400] "GET /welcome/images/team-7.jpg HTTP/1.1" 304 - "https://ghostgamingvpn.io/welcome/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36"
45.61.142.93 - - [04/Aug/2020:05:20:31 -0400] "GET /welcome/images/team-1.jpg HTTP/1.1" 304 - "https://ghostgamingvpn.io/welcome/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36"
45.61.142.93 - - [04/Aug/2020:05:20:31 -0400] "GET /welcome/images/accepted-worldwide.svg HTTP/1.1" 304 - "https://ghostgamingvpn.io/welcome/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/5
...
2020-08-05 00:42:33
218.92.0.173 attackbots
Aug  4 18:35:54 jane sshd[31555]: Failed password for root from 218.92.0.173 port 22319 ssh2
Aug  4 18:35:59 jane sshd[31555]: Failed password for root from 218.92.0.173 port 22319 ssh2
...
2020-08-05 00:39:06
192.99.2.41 attack
sshd jail - ssh hack attempt
2020-08-05 00:48:04
222.186.175.150 attackbotsspam
Aug  4 18:44:05 sso sshd[25128]: Failed password for root from 222.186.175.150 port 49610 ssh2
Aug  4 18:44:09 sso sshd[25128]: Failed password for root from 222.186.175.150 port 49610 ssh2
...
2020-08-05 00:51:37
206.189.83.111 attack
(sshd) Failed SSH login from 206.189.83.111 (SG/Singapore/-): 5 in the last 3600 secs
2020-08-05 00:20:23
89.248.162.247 attack
3301/tcp 3662/tcp 20041/tcp...
[2020-06-05/08-04]612pkt,134pt.(tcp)
2020-08-05 00:43:02
122.180.30.186 attackbotsspam
122.180.30.186 - - [04/Aug/2020:17:43:13 +0200] "POST /xmlrpc.php HTTP/1.1" 403 22623 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
122.180.30.186 - - [04/Aug/2020:17:52:03 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-05 00:12:32

Recently Reported IPs

104.21.62.240 104.21.70.191 104.21.62.250 104.21.62.29
104.21.62.3 104.21.62.28 104.21.62.4 104.21.70.195
104.21.62.53 104.21.62.56 104.21.62.62 104.21.62.70
104.21.62.69 104.21.62.72 104.21.70.197 104.21.62.75
104.21.62.64 104.21.62.79 104.21.62.84 104.21.62.86