Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.7.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.7.219.			IN	A

;; AUTHORITY SECTION:
.			201	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 05:25:09 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 219.7.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.7.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.150 attackbots
Triggered by Fail2Ban at Ares web server
2019-12-31 15:33:52
47.247.5.196 attack
1577773716 - 12/31/2019 07:28:36 Host: 47.247.5.196/47.247.5.196 Port: 445 TCP Blocked
2019-12-31 15:31:34
218.58.124.42 attack
--- report ---
Dec 31 03:53:18 -0300 sshd: Connection from 218.58.124.42 port 18033
Dec 31 03:53:22 -0300 sshd: Failed password for root from 218.58.124.42 port 18033 ssh2
Dec 31 03:53:22 -0300 sshd: Received disconnect from 218.58.124.42: 11: Normal Shutdown, Thank you for playing [preauth]
2019-12-31 15:58:53
183.81.96.202 attack
19/12/31@01:27:41: FAIL: Alarm-Network address from=183.81.96.202
...
2019-12-31 15:59:15
2.228.163.157 attack
$f2bV_matches
2019-12-31 15:25:33
45.227.255.149 attackspam
over 100 attempt today of SQL Injection on our website
2019-12-31 15:42:34
146.88.240.4 attackspam
146.88.240.4 was recorded 96 times by 7 hosts attempting to connect to the following ports: 53,3702,1604,5093,520,27019,123,69,28015,161,19,7778,7779,10001,1701,1194,47808,27017. Incident counter (4h, 24h, all-time): 96, 196, 40895
2019-12-31 15:54:16
54.37.54.247 attackspambots
Brute force attempt
2019-12-31 15:52:28
162.211.109.201 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-31 15:43:32
159.89.123.66 attackspam
Automatic report - XMLRPC Attack
2019-12-31 15:48:25
49.232.35.211 attackbots
Dec 31 07:57:30 markkoudstaal sshd[20807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.35.211
Dec 31 07:57:31 markkoudstaal sshd[20807]: Failed password for invalid user chesney from 49.232.35.211 port 49146 ssh2
Dec 31 08:01:34 markkoudstaal sshd[21124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.35.211
2019-12-31 16:05:46
54.37.54.248 attackspambots
Brute force attempt
2019-12-31 15:52:09
14.232.152.158 attackbots
Autoban   14.232.152.158 AUTH/CONNECT
2019-12-31 16:04:28
81.214.243.80 attackspam
Automatic report - Port Scan Attack
2019-12-31 16:00:59
201.48.65.147 attack
Fail2Ban Ban Triggered
2019-12-31 15:40:33

Recently Reported IPs

104.21.7.211 104.21.7.173 104.21.7.241 104.21.7.216
104.21.7.248 104.21.7.55 104.21.7.226 104.21.7.84
104.21.7.33 104.21.7.80 104.21.70.105 104.21.70.132
104.21.70.114 104.21.70.118 104.21.70.172 104.21.70.147
104.21.70.134 104.21.70.182 104.21.70.173 104.21.70.179