Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.64.248 spam
Spammer Website using 104.21.64.248
2022-09-19 03:38:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.64.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.64.129.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:39:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 129.64.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.64.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.137.3.130 attackspambots
[portscan] Port scan
2019-07-06 11:16:02
113.73.147.125 attack
Banned for posting to wp-login.php without referer {"wp-submit":"Log In","log":"admin","testcookie":"1","pwd":"admin1","redirect_to":"http:\/\/lisadamatoadv.com\/wp-admin\/theme-install.php"}
2019-07-06 10:59:24
103.242.57.155 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 00:22:15,547 INFO [shellcode_manager] (103.242.57.155) no match, writing hexdump (16d22a1f6074418becf114d6e032b8bf :2513100) - MS17010 (EternalBlue)
2019-07-06 12:02:49
139.199.72.40 attack
TCP port 993 (IMAP) attempt blocked by hMailServer IP-check. Abuse score 63%
2019-07-06 11:15:44
144.217.84.129 attackbotsspam
Jul  6 04:58:49 ArkNodeAT sshd\[11684\]: Invalid user tecnici from 144.217.84.129
Jul  6 04:58:49 ArkNodeAT sshd\[11684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.84.129
Jul  6 04:58:50 ArkNodeAT sshd\[11684\]: Failed password for invalid user tecnici from 144.217.84.129 port 33114 ssh2
2019-07-06 11:08:08
51.68.220.249 attackbotsspam
Jul  6 04:58:06 rpi sshd[19934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.220.249 
Jul  6 04:58:08 rpi sshd[19934]: Failed password for invalid user cvs from 51.68.220.249 port 54974 ssh2
2019-07-06 11:26:21
168.195.208.226 attackspam
SMTP-sasl brute force
...
2019-07-06 12:02:31
106.13.72.28 attack
Jul  6 04:58:17 lnxded63 sshd[17018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.28
Jul  6 04:58:17 lnxded63 sshd[17018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.28
2019-07-06 11:22:54
189.89.221.89 attack
SMTP-sasl brute force
...
2019-07-06 12:06:19
81.215.202.215 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 02:22:59,737 INFO [amun_request_handler] PortScan Detected on Port: 445 (81.215.202.215)
2019-07-06 11:07:35
201.161.58.229 attackspam
Jul  6 04:59:01 ns41 sshd[5352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.161.58.229
Jul  6 04:59:01 ns41 sshd[5352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.161.58.229
2019-07-06 11:05:14
91.134.241.32 attack
Jul  6 03:19:18 animalibera sshd[28796]: Invalid user fb from 91.134.241.32 port 47354
...
2019-07-06 11:23:36
58.221.204.114 attack
Jul  6 09:26:02 tanzim-HP-Z238-Microtower-Workstation sshd\[554\]: Invalid user kristy from 58.221.204.114
Jul  6 09:26:02 tanzim-HP-Z238-Microtower-Workstation sshd\[554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.204.114
Jul  6 09:26:04 tanzim-HP-Z238-Microtower-Workstation sshd\[554\]: Failed password for invalid user kristy from 58.221.204.114 port 51690 ssh2
...
2019-07-06 12:05:43
182.160.104.218 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 00:15:34,684 INFO [shellcode_manager] (182.160.104.218) no match, writing hexdump (7790c7642b3acef7a9392d9c26627e4e :2068609) - MS17010 (EternalBlue)
2019-07-06 11:05:36
191.102.120.85 attackbotsspam
Brute force attempt
2019-07-06 11:18:22

Recently Reported IPs

104.17.142.48 104.17.142.34 104.17.142.63 104.17.143.48
104.17.143.31 104.17.146.31 104.17.143.63 104.17.143.34
104.17.144.31 104.17.143.181 104.17.145.31 104.17.146.63
104.17.148.77 104.17.149.27 104.17.147.77 104.17.146.34
104.17.15.24 104.21.64.130 104.17.150.49 104.17.150.27