Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.7.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.7.21.			IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 05:25:06 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 21.7.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.7.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.196.224.150 attack
Unauthorized access detected from black listed ip!
2020-09-08 21:54:58
144.217.72.135 attackspam
Unauthorized connection attempt from IP address 144.217.72.135 on port 587
2020-09-08 21:27:07
45.142.120.209 attackbots
Sep  8 15:16:06 srv01 postfix/smtpd\[25646\]: warning: unknown\[45.142.120.209\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 15:16:25 srv01 postfix/smtpd\[12487\]: warning: unknown\[45.142.120.209\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 15:16:26 srv01 postfix/smtpd\[21579\]: warning: unknown\[45.142.120.209\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 15:16:32 srv01 postfix/smtpd\[25646\]: warning: unknown\[45.142.120.209\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 15:16:49 srv01 postfix/smtpd\[25646\]: warning: unknown\[45.142.120.209\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-08 21:18:40
219.126.240.105 attackbotsspam
1599517215 - 09/08/2020 00:20:15 Host: 219.126.240.105/219.126.240.105 Port: 23 TCP Blocked
...
2020-09-08 21:32:27
5.200.83.43 attackspam
1599497668 - 09/07/2020 18:54:28 Host: 5.200.83.43/5.200.83.43 Port: 445 TCP Blocked
2020-09-08 21:13:48
156.54.172.248 attackspam
Sep  8 04:06:14 ajax sshd[9666]: Failed password for root from 156.54.172.248 port 60296 ssh2
2020-09-08 21:20:30
222.186.31.83 attackspambots
Sep  8 15:15:15 santamaria sshd\[30829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Sep  8 15:15:18 santamaria sshd\[30829\]: Failed password for root from 222.186.31.83 port 50858 ssh2
Sep  8 15:15:20 santamaria sshd\[30829\]: Failed password for root from 222.186.31.83 port 50858 ssh2
...
2020-09-08 21:16:25
178.128.221.162 attackbotsspam
 TCP (SYN) 178.128.221.162:57994 -> port 1596, len 44
2020-09-08 21:37:22
207.180.205.252 attack
2020-09-08T00:26:36.846343xentho-1 sshd[560258]: Invalid user zhouxian from 207.180.205.252 port 41674
2020-09-08T00:26:38.822420xentho-1 sshd[560258]: Failed password for invalid user zhouxian from 207.180.205.252 port 41674 ssh2
2020-09-08T00:27:17.383979xentho-1 sshd[560261]: Invalid user zengjiaqi from 207.180.205.252 port 36918
2020-09-08T00:27:17.391288xentho-1 sshd[560261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.205.252
2020-09-08T00:27:17.383979xentho-1 sshd[560261]: Invalid user zengjiaqi from 207.180.205.252 port 36918
2020-09-08T00:27:18.984627xentho-1 sshd[560261]: Failed password for invalid user zengjiaqi from 207.180.205.252 port 36918 ssh2
2020-09-08T00:27:53.138186xentho-1 sshd[560270]: Invalid user zengjiaqi from 207.180.205.252 port 60228
2020-09-08T00:27:53.143798xentho-1 sshd[560270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.205.252
2020-09-08T00:27:53.13
...
2020-09-08 21:31:35
187.107.67.41 attack
SSH Invalid Login
2020-09-08 21:54:16
34.126.118.178 attackbots
...
2020-09-08 21:33:54
50.63.197.60 attack
Automatic report - XMLRPC Attack
2020-09-08 21:35:04
195.122.226.164 attackspambots
Sep  8 14:45:58 server sshd[7974]: Failed password for invalid user ftpuser from 195.122.226.164 port 2267 ssh2
Sep  8 15:02:08 server sshd[31216]: Failed password for invalid user web from 195.122.226.164 port 62858 ssh2
Sep  8 15:05:59 server sshd[4546]: Failed password for root from 195.122.226.164 port 41209 ssh2
2020-09-08 21:34:23
162.220.151.98 attack
 TCP (SYN) 162.220.151.98:34934 -> port 8080, len 40
2020-09-08 21:52:17
95.167.178.149 attackspam
$f2bV_matches
2020-09-08 21:25:15

Recently Reported IPs

104.21.7.20 104.21.7.119 104.21.7.130 104.21.7.192
104.21.7.194 104.21.7.205 104.21.7.191 104.21.7.162
104.21.7.211 104.21.7.219 104.21.7.173 104.21.7.241
104.21.7.216 104.21.7.248 104.21.7.55 104.21.7.226
104.21.7.84 104.21.7.33 104.21.7.80 104.21.70.105