Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.7.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17885
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.7.91.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:48:28 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 91.7.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.7.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.57.151.234 attackspambots
Unauthorized connection attempt from IP address 66.57.151.234 on Port 445(SMB)
2020-04-27 00:14:40
195.135.246.167 attackbots
Port probing on unauthorized port 8000
2020-04-27 00:20:13
54.36.150.114 attackbotsspam
Automatic report - Banned IP Access
2020-04-26 23:45:34
61.0.240.170 attack
Unauthorized connection attempt from IP address 61.0.240.170 on Port 445(SMB)
2020-04-26 23:37:43
178.176.165.248 attackspam
Unauthorized connection attempt from IP address 178.176.165.248 on Port 445(SMB)
2020-04-26 23:39:50
103.60.180.132 attackspam
Brute force attempt
2020-04-27 00:26:30
192.144.188.169 attack
2020-04-26T08:43:23.0372871495-001 sshd[46652]: Invalid user design from 192.144.188.169 port 54280
2020-04-26T08:43:24.9375281495-001 sshd[46652]: Failed password for invalid user design from 192.144.188.169 port 54280 ssh2
2020-04-26T08:48:46.4252561495-001 sshd[46890]: Invalid user rd from 192.144.188.169 port 55346
2020-04-26T08:48:46.4281671495-001 sshd[46890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.188.169
2020-04-26T08:48:46.4252561495-001 sshd[46890]: Invalid user rd from 192.144.188.169 port 55346
2020-04-26T08:48:48.3313511495-001 sshd[46890]: Failed password for invalid user rd from 192.144.188.169 port 55346 ssh2
...
2020-04-26 23:57:56
49.233.147.108 attackspambots
Apr 26 22:01:18 localhost sshd[18674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.147.108
...
2020-04-27 00:24:50
114.231.45.156 attackbots
fail2ban/Apr 26 15:42:53 h1962932 postfix/smtpd[28274]: warning: unknown[114.231.45.156]: SASL LOGIN authentication failed: authentication failure
Apr 26 15:42:55 h1962932 postfix/smtpd[28274]: warning: unknown[114.231.45.156]: SASL LOGIN authentication failed: authentication failure
Apr 26 15:43:07 h1962932 postfix/smtpd[28274]: warning: unknown[114.231.45.156]: SASL LOGIN authentication failed: authentication failure
2020-04-26 23:59:50
148.102.17.19 attack
Apr 26 13:52:52 ns382633 sshd\[21065\]: Invalid user ubuntu from 148.102.17.19 port 33510
Apr 26 13:52:52 ns382633 sshd\[21065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.102.17.19
Apr 26 13:52:54 ns382633 sshd\[21065\]: Failed password for invalid user ubuntu from 148.102.17.19 port 33510 ssh2
Apr 26 14:01:19 ns382633 sshd\[22910\]: Invalid user polkitd from 148.102.17.19 port 41401
Apr 26 14:01:19 ns382633 sshd\[22910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.102.17.19
2020-04-27 00:18:13
1.24.149.148 attackbots
Unauthorized connection attempt detected from IP address 1.24.149.148 to port 23 [T]
2020-04-27 00:27:22
218.21.102.72 attackbotsspam
Unauthorized connection attempt from IP address 218.21.102.72 on Port 445(SMB)
2020-04-26 23:52:41
182.75.216.74 attack
$f2bV_matches
2020-04-27 00:09:43
91.231.40.97 attackbotsspam
Unauthorized connection attempt from IP address 91.231.40.97 on Port 445(SMB)
2020-04-26 23:43:30
222.186.173.180 attack
2020-04-26T15:52:19.421594shield sshd\[5859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
2020-04-26T15:52:21.549488shield sshd\[5859\]: Failed password for root from 222.186.173.180 port 59358 ssh2
2020-04-26T15:52:24.992299shield sshd\[5859\]: Failed password for root from 222.186.173.180 port 59358 ssh2
2020-04-26T15:52:27.983626shield sshd\[5859\]: Failed password for root from 222.186.173.180 port 59358 ssh2
2020-04-26T15:52:31.386508shield sshd\[5859\]: Failed password for root from 222.186.173.180 port 59358 ssh2
2020-04-26 23:57:35

Recently Reported IPs

104.21.7.87 104.21.7.92 104.21.7.95 104.21.70.10
104.21.71.149 104.21.70.109 104.21.70.115 104.21.70.124
104.21.70.12 104.21.70.123 104.21.70.128 104.21.70.129
104.21.70.135 104.21.70.133 104.21.71.150 104.21.70.13
104.21.70.137 104.21.70.141 104.21.70.139 104.21.70.146