Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.66.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.66.64.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:45:14 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 64.66.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.66.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
87.226.165.143 attackbots
$f2bV_matches
2020-05-08 15:51:38
122.152.210.200 attack
May  7 23:54:28 mail sshd\[28484\]: Invalid user fa from 122.152.210.200
May  7 23:54:28 mail sshd\[28484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.210.200
...
2020-05-08 15:39:30
167.249.11.57 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-05-08 15:33:38
1.179.137.10 attack
May  8 09:44:54 eventyay sshd[14391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10
May  8 09:44:56 eventyay sshd[14391]: Failed password for invalid user rex from 1.179.137.10 port 33643 ssh2
May  8 09:49:44 eventyay sshd[14458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10
...
2020-05-08 15:50:02
142.44.243.160 attackspambots
<6 unauthorized SSH connections
2020-05-08 15:34:15
118.89.219.116 attackspambots
May  8 06:55:42 srv206 sshd[10626]: Invalid user fh from 118.89.219.116
May  8 06:55:42 srv206 sshd[10626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.219.116
May  8 06:55:42 srv206 sshd[10626]: Invalid user fh from 118.89.219.116
May  8 06:55:44 srv206 sshd[10626]: Failed password for invalid user fh from 118.89.219.116 port 38922 ssh2
...
2020-05-08 15:37:02
59.126.196.162 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-08 15:30:16
77.49.115.206 attackspambots
May  8 07:42:50 inter-technics sshd[6932]: Invalid user apagar from 77.49.115.206 port 47464
May  8 07:42:50 inter-technics sshd[6932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.49.115.206
May  8 07:42:50 inter-technics sshd[6932]: Invalid user apagar from 77.49.115.206 port 47464
May  8 07:42:52 inter-technics sshd[6932]: Failed password for invalid user apagar from 77.49.115.206 port 47464 ssh2
May  8 07:47:14 inter-technics sshd[7461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.49.115.206  user=root
May  8 07:47:16 inter-technics sshd[7461]: Failed password for root from 77.49.115.206 port 59176 ssh2
...
2020-05-08 15:55:45
83.24.255.250 attackbots
$f2bV_matches
2020-05-08 15:33:51
117.5.55.227 attackbots
Unauthorised access (May  8) SRC=117.5.55.227 LEN=52 TTL=109 ID=28281 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-08 15:31:41
195.231.3.181 attackspam
May  8 09:39:46 relay postfix/smtpd\[20818\]: warning: unknown\[195.231.3.181\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  8 09:40:34 relay postfix/smtpd\[14021\]: warning: unknown\[195.231.3.181\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  8 09:40:55 relay postfix/smtpd\[16807\]: warning: unknown\[195.231.3.181\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  8 09:41:00 relay postfix/smtpd\[20796\]: warning: unknown\[195.231.3.181\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  8 09:41:37 relay postfix/smtpd\[23779\]: warning: unknown\[195.231.3.181\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-08 15:43:40
201.76.117.33 attackspambots
Unauthorized connection attempt from IP address 201.76.117.33 on Port 445(SMB)
2020-05-08 16:14:47
61.133.232.252 attackbotsspam
May  8 00:49:21 firewall sshd[26011]: Invalid user el from 61.133.232.252
May  8 00:49:22 firewall sshd[26011]: Failed password for invalid user el from 61.133.232.252 port 30545 ssh2
May  8 00:54:10 firewall sshd[26148]: Invalid user postgres from 61.133.232.252
...
2020-05-08 15:53:44
35.184.155.136 attackspam
$f2bV_matches
2020-05-08 15:38:43
221.236.77.85 attack
fail2ban -- 221.236.77.85
...
2020-05-08 15:37:51

Recently Reported IPs

104.21.66.60 104.21.66.69 104.21.66.70 104.21.66.75
104.21.70.57 104.21.66.84 104.21.66.80 104.21.66.85
104.21.70.59 104.21.66.89 104.21.66.92 104.21.67.104
104.21.66.94 104.21.67.110 104.21.67.128 104.21.70.6
104.21.67.134 104.21.67.139 104.21.67.141 104.21.67.15