Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.7.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.7.234.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:48:09 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 234.7.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.7.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.225.73.66 attack
1591272589 - 06/04/2020 14:09:49 Host: 46.225.73.66/46.225.73.66 Port: 445 TCP Blocked
2020-06-04 20:31:16
129.204.181.48 attack
Jun  4 14:55:28 buvik sshd[7046]: Failed password for root from 129.204.181.48 port 57522 ssh2
Jun  4 14:58:19 buvik sshd[7301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.181.48  user=root
Jun  4 14:58:21 buvik sshd[7301]: Failed password for root from 129.204.181.48 port 36424 ssh2
...
2020-06-04 21:08:16
220.132.193.252 attack
Port Scan detected!
...
2020-06-04 20:43:05
181.177.112.216 attack
3,49-07/07 [bc04/m164] PostRequest-Spammer scoring: nairobi
2020-06-04 20:30:00
62.210.180.146 attackspam
Unauthorized access detected from black listed ip!
2020-06-04 20:26:13
198.23.145.206 attackbotsspam
(From elisabeth.rider@msn.com) Hi oakleaffamilychiropractic.net 

The unfortunate truth about your online business is
that it’s not likely to ever make you a profit.

It’s sad but true…

The numbers don’t lie.

Most online businesses never turn a profit.

This Video Explains Why
https://mupt.de/amz/75o0


Now just because most people can’t make their
online business work, doesn’t mean that you can’t.

But in order to make it work…

You have to understand why most fail.

Watch This
https://mupt.de/amz/75o0


Don’t be like all of those other unfortunate people that
get suckered into wasting their time on something
that’s destined to fail.

Click Here and learn how to make sure you succeed
online.
https://mupt.de/amz/75o0
 
Talk soon,
Elisabeth
 
P.S.Checkout Something Different by
Clicking Here
https://mupt.de/amz/75o0
2020-06-04 21:02:48
89.252.24.121 attack
Jun  4 15:38:16 debian kernel: [176859.503463] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=89.252.24.121 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=48323 DF PROTO=TCP SPT=64139 DPT=7547 WINDOW=14600 RES=0x00 SYN URGP=0
2020-06-04 21:04:13
180.100.213.63 attackspam
SSH Brute Force
2020-06-04 20:53:02
172.104.94.253 attack
Jun  4 14:09:48 debian-2gb-nbg1-2 kernel: \[13531346.583678\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=172.104.94.253 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=49345 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-04 20:30:19
2001:41d0:1:8268::1 attackspambots
SS5,WP GET /wp-login.php
2020-06-04 20:32:35
104.244.73.193 attackspam
prod6
...
2020-06-04 20:54:40
129.28.30.54 attackbots
Jun  4 14:37:01 PorscheCustomer sshd[18806]: Failed password for root from 129.28.30.54 port 34414 ssh2
Jun  4 14:39:21 PorscheCustomer sshd[18909]: Failed password for root from 129.28.30.54 port 35138 ssh2
...
2020-06-04 21:04:29
130.162.71.237 attackbotsspam
Jun  4 14:51:02 abendstille sshd\[8315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.71.237  user=root
Jun  4 14:51:04 abendstille sshd\[8315\]: Failed password for root from 130.162.71.237 port 19209 ssh2
Jun  4 14:54:50 abendstille sshd\[12337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.71.237  user=root
Jun  4 14:54:52 abendstille sshd\[12337\]: Failed password for root from 130.162.71.237 port 49069 ssh2
Jun  4 14:58:46 abendstille sshd\[16191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.71.237  user=root
...
2020-06-04 21:02:20
49.88.112.112 attackspambots
$f2bV_matches
2020-06-04 20:30:54
118.186.2.18 attackspambots
Jun  4 14:37:13 server sshd[32676]: Failed password for root from 118.186.2.18 port 35858 ssh2
Jun  4 14:39:41 server sshd[660]: Failed password for root from 118.186.2.18 port 48743 ssh2
...
2020-06-04 20:55:33

Recently Reported IPs

104.21.71.141 104.21.7.237 104.21.7.239 104.21.7.240
104.21.7.244 104.21.7.251 104.21.7.25 104.21.7.252
104.21.71.143 104.21.7.31 104.21.7.28 104.21.7.253
104.21.7.4 104.21.7.32 104.21.7.43 104.21.71.144
104.21.7.48 104.21.7.50 104.21.7.5 104.21.7.57