Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.74.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.74.244.			IN	A

;; AUTHORITY SECTION:
.			243	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:19:11 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 244.74.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.74.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.7.227.107 attack
Aug  3 05:53:10 mail sshd\[6188\]: Failed password for invalid user edwina from 51.7.227.107 port 42262 ssh2
Aug  3 06:10:53 mail sshd\[6412\]: Invalid user xten from 51.7.227.107 port 59616
Aug  3 06:10:53 mail sshd\[6412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.7.227.107
...
2019-08-03 13:27:04
128.199.154.237 attackbots
Automatic report - Banned IP Access
2019-08-03 12:57:40
187.113.46.137 attackbotsspam
Lines containing failures of 187.113.46.137
Aug  2 04:14:11 srv02 sshd[7888]: Invalid user google from 187.113.46.137 port 55240
Aug  2 04:14:11 srv02 sshd[7888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.113.46.137
Aug  2 04:14:12 srv02 sshd[7888]: Failed password for invalid user google from 187.113.46.137 port 55240 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.113.46.137
2019-08-03 13:16:09
141.105.173.196 attackspambots
1433/tcp 445/tcp
[2019-08-02]2pkt
2019-08-03 12:43:15
54.223.110.32 attack
Aug  3 06:10:11 debian sshd\[7211\]: Invalid user euser from 54.223.110.32 port 44425
Aug  3 06:10:11 debian sshd\[7211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.223.110.32
...
2019-08-03 13:26:14
223.27.212.187 attack
Scanning random ports - tries to find possible vulnerable services
2019-08-03 12:55:16
35.198.160.68 attackbotsspam
Aug  3 07:43:58 www2 sshd\[19372\]: Failed password for root from 35.198.160.68 port 55688 ssh2Aug  3 07:53:28 www2 sshd\[20432\]: Invalid user monitor from 35.198.160.68Aug  3 07:53:30 www2 sshd\[20432\]: Failed password for invalid user monitor from 35.198.160.68 port 52030 ssh2
...
2019-08-03 13:06:39
180.69.95.125 attackspam
2222/tcp
[2019-08-03]1pkt
2019-08-03 12:34:27
65.111.162.182 attackspambots
Aug  2 04:13:14 server6 sshd[8320]: Failed password for invalid user admin from 65.111.162.182 port 44294 ssh2
Aug  2 04:13:14 server6 sshd[8320]: Received disconnect from 65.111.162.182: 11: Bye Bye [preauth]
Aug  2 04:22:51 server6 sshd[18571]: Failed password for invalid user ho from 65.111.162.182 port 59470 ssh2
Aug  2 04:22:51 server6 sshd[18571]: Received disconnect from 65.111.162.182: 11: Bye Bye [preauth]
Aug  2 04:27:18 server6 sshd[22837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.111.162.182  user=r.r
Aug  2 04:27:20 server6 sshd[22837]: Failed password for r.r from 65.111.162.182 port 55894 ssh2
Aug  2 04:27:20 server6 sshd[22837]: Received disconnect from 65.111.162.182: 11: Bye Bye [preauth]
Aug  2 04:32:00 server6 sshd[26046]: Failed password for invalid user jeferson from 65.111.162.182 port 52714 ssh2
Aug  2 04:32:00 server6 sshd[26046]: Received disconnect from 65.111.162.182: 11: Bye Bye [preauth]


........
--------------------------------
2019-08-03 13:21:11
62.234.55.241 attackbots
blacklist username jester
Invalid user jester from 62.234.55.241 port 47684
2019-08-03 12:49:39
178.128.201.146 attack
WordPress wp-login brute force :: 178.128.201.146 0.052 BYPASS [03/Aug/2019:14:52:52  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-03 13:40:50
80.211.51.116 attackbots
Aug  3 07:50:55 www2 sshd\[20269\]: Invalid user oladapo from 80.211.51.116Aug  3 07:50:57 www2 sshd\[20269\]: Failed password for invalid user oladapo from 80.211.51.116 port 39144 ssh2Aug  3 07:57:29 www2 sshd\[20932\]: Failed password for root from 80.211.51.116 port 35258 ssh2
...
2019-08-03 13:13:17
93.158.166.145 attackspam
EventTime:Sat Aug 3 05:16:59 AEST 2019,Protocol:TCP,VendorEventCode:RT_FLOW_SESSION_DENY,TargetPort:81,SourceIP:93.158.166.145,SourcePort:63337
2019-08-03 12:41:34
178.119.231.202 attack
Aug  2 22:46:53 h1637304 sshd[1103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178-119-231-202.access.telenet.be 
Aug  2 22:46:55 h1637304 sshd[1103]: Failed password for invalid user admin from 178.119.231.202 port 35971 ssh2
Aug  2 22:46:57 h1637304 sshd[1103]: Failed password for invalid user admin from 178.119.231.202 port 35971 ssh2
Aug  2 22:46:59 h1637304 sshd[1103]: Failed password for invalid user admin from 178.119.231.202 port 35971 ssh2
Aug  2 22:47:02 h1637304 sshd[1103]: Failed password for invalid user admin from 178.119.231.202 port 35971 ssh2
Aug  2 22:47:08 h1637304 sshd[1103]: Failed password for invalid user admin from 178.119.231.202 port 35971 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.119.231.202
2019-08-03 12:35:05
125.16.18.98 attack
Aug  2 20:15:36 aat-srv002 sshd[27465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.16.18.98
Aug  2 20:15:39 aat-srv002 sshd[27465]: Failed password for invalid user marci from 125.16.18.98 port 34184 ssh2
Aug  2 20:20:47 aat-srv002 sshd[27583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.16.18.98
Aug  2 20:20:49 aat-srv002 sshd[27583]: Failed password for invalid user davidc from 125.16.18.98 port 57184 ssh2
...
2019-08-03 12:39:03

Recently Reported IPs

104.21.74.237 104.21.74.234 104.21.74.22 104.21.74.197
104.21.74.25 104.21.74.32 13.225.71.8 104.21.74.196
104.21.74.35 104.21.74.41 104.21.74.44 104.21.74.48
104.21.74.59 104.21.74.64 104.21.74.85 104.21.74.67
104.21.74.55 104.21.75.109 104.21.75.125 104.21.75.127