Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.7.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3049
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.7.2.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:34:45 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 2.7.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.7.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
150.129.57.235 attack
21 attempts against mh-ssh on wind
2020-07-06 03:09:33
115.29.246.243 attack
Jul  5 20:33:16 minden010 sshd[18593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.29.246.243
Jul  5 20:33:18 minden010 sshd[18593]: Failed password for invalid user marketing from 115.29.246.243 port 38899 ssh2
Jul  5 20:36:36 minden010 sshd[20778]: Failed password for root from 115.29.246.243 port 60719 ssh2
...
2020-07-06 02:48:28
125.70.244.4 attack
Jul  5 17:40:34 plex-server sshd[206658]: Invalid user administrator from 125.70.244.4 port 58994
Jul  5 17:40:34 plex-server sshd[206658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.70.244.4 
Jul  5 17:40:34 plex-server sshd[206658]: Invalid user administrator from 125.70.244.4 port 58994
Jul  5 17:40:36 plex-server sshd[206658]: Failed password for invalid user administrator from 125.70.244.4 port 58994 ssh2
Jul  5 17:44:14 plex-server sshd[207901]: Invalid user user from 125.70.244.4 port 57610
...
2020-07-06 02:31:57
51.254.49.99 attack
9200/tcp 11211/tcp 102/tcp...
[2020-05-07/07-05]47pkt,12pt.(tcp)
2020-07-06 02:31:37
111.61.177.158 attack
[portscan] Port scan
2020-07-06 02:50:06
177.73.28.199 attack
Jul  4 08:21:24 server6 sshd[2031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177-73-28-199.user.conectnet.net
Jul  4 08:21:26 server6 sshd[2031]: Failed password for invalid user nisa from 177.73.28.199 port 47728 ssh2
Jul  4 08:21:26 server6 sshd[2031]: Received disconnect from 177.73.28.199: 11: Bye Bye [preauth]
Jul  4 08:37:55 server6 sshd[17714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177-73-28-199.user.conectnet.net
Jul  4 08:37:58 server6 sshd[17714]: Failed password for invalid user sed from 177.73.28.199 port 47452 ssh2
Jul  4 08:37:58 server6 sshd[17714]: Received disconnect from 177.73.28.199: 11: Bye Bye [preauth]
Jul  4 08:41:50 server6 sshd[21938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177-73-28-199.user.conectnet.net
Jul  4 08:41:52 server6 sshd[21938]: Failed password for invalid user serveur from 177.73.28.199........
-------------------------------
2020-07-06 02:33:42
36.155.113.40 attackbots
Jul  5 20:42:10 ns382633 sshd\[28106\]: Invalid user vtcbikes from 36.155.113.40 port 58653
Jul  5 20:42:10 ns382633 sshd\[28106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.40
Jul  5 20:42:13 ns382633 sshd\[28106\]: Failed password for invalid user vtcbikes from 36.155.113.40 port 58653 ssh2
Jul  5 20:53:12 ns382633 sshd\[29819\]: Invalid user test from 36.155.113.40 port 49458
Jul  5 20:53:12 ns382633 sshd\[29819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.40
2020-07-06 02:59:01
168.228.197.91 attackspambots
Cluster member 67.227.229.95 (US/United States/saathoff.geek) said, DENY 168.228.197.91, Reason:[(sshd) Failed SSH login from 168.228.197.91 (BR/Brazil/maxfibra-168-228-197-91.yune.com.br): 1 in the last 3600 secs]; Ports: *; Direction: inout; Trigger: LF_CLUSTER
2020-07-06 03:11:12
89.248.168.244 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 81 - port: 5720 proto: TCP cat: Misc Attack
2020-07-06 02:37:14
13.75.67.174 attack
Jul  5 20:36:24 vps647732 sshd[6612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.75.67.174
Jul  5 20:36:26 vps647732 sshd[6612]: Failed password for invalid user ts3 from 13.75.67.174 port 60210 ssh2
...
2020-07-06 03:07:04
178.128.13.79 attack
Jul  5 20:36:41 b-vps wordpress(rreb.cz)[1271]: Authentication attempt for unknown user barbora from 178.128.13.79
...
2020-07-06 02:41:44
46.142.2.192 attack
Jul  5 20:36:22 ourumov-web sshd\[25831\]: Invalid user daniel from 46.142.2.192 port 41541
Jul  5 20:36:22 ourumov-web sshd\[25831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.142.2.192
Jul  5 20:36:23 ourumov-web sshd\[25831\]: Failed password for invalid user daniel from 46.142.2.192 port 41541 ssh2
...
2020-07-06 03:12:08
150.109.5.248 attackbots
[Thu Jul 02 04:56:14 2020] - DDoS Attack From IP: 150.109.5.248 Port: 54446
2020-07-06 02:53:18
212.64.91.114 attackspam
frenzy
2020-07-06 02:44:17
82.64.185.67 attack
Jul  5 20:36:26 mout sshd[15717]: Invalid user ts from 82.64.185.67 port 54287
2020-07-06 03:06:06

Recently Reported IPs

104.21.50.219 104.21.50.221 104.21.50.230 104.21.50.240
104.21.50.233 104.21.50.239 104.21.50.24 104.21.50.234
104.21.50.243 104.21.50.241 104.21.50.245 104.21.50.222
104.21.50.229 104.21.50.247 104.21.7.204 104.21.50.250
104.21.50.3 104.21.50.36 104.21.50.253 104.21.50.39