Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.77.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12577
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.77.194.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:56:30 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 194.77.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.77.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.188 attackspam
2020-06-06T09:27:06.680324lavrinenko.info sshd[17349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.188  user=root
2020-06-06T09:27:08.300490lavrinenko.info sshd[17349]: Failed password for root from 112.85.42.188 port 40413 ssh2
2020-06-06T09:27:06.680324lavrinenko.info sshd[17349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.188  user=root
2020-06-06T09:27:08.300490lavrinenko.info sshd[17349]: Failed password for root from 112.85.42.188 port 40413 ssh2
2020-06-06T09:27:10.910074lavrinenko.info sshd[17349]: Failed password for root from 112.85.42.188 port 40413 ssh2
...
2020-06-06 14:37:34
222.186.42.137 attack
Jun  6 08:55:14 eventyay sshd[6558]: Failed password for root from 222.186.42.137 port 10637 ssh2
Jun  6 08:55:23 eventyay sshd[6560]: Failed password for root from 222.186.42.137 port 34396 ssh2
Jun  6 08:55:25 eventyay sshd[6560]: Failed password for root from 222.186.42.137 port 34396 ssh2
...
2020-06-06 14:57:36
49.88.112.112 attackspambots
$f2bV_matches
2020-06-06 14:50:31
45.134.179.102 attackspambots
Jun  6 06:33:37 [host] kernel: [8046364.832450] [U
Jun  6 06:39:55 [host] kernel: [8046743.087776] [U
Jun  6 06:43:39 [host] kernel: [8046966.659010] [U
Jun  6 06:54:45 [host] kernel: [8047633.199696] [U
Jun  6 06:58:39 [host] kernel: [8047867.298702] [U
Jun  6 06:59:38 [host] kernel: [8047926.128154] [U
2020-06-06 14:13:33
186.215.235.9 attackbotsspam
$f2bV_matches
2020-06-06 14:46:33
165.56.7.94 attackspam
Brute-force attempt banned
2020-06-06 14:35:56
218.86.64.132 attack
Port scan on 5 port(s): 1433 3433 4433 8433 11433
2020-06-06 14:21:49
83.99.244.76 normal
Web-Hosting
2020-06-06 14:53:33
210.212.233.34 attackspam
Jun  6 07:20:31 sso sshd[28773]: Failed password for root from 210.212.233.34 port 55750 ssh2
...
2020-06-06 14:07:40
46.174.191.32 attack
 TCP (SYN) 46.174.191.32:34584 -> port 8080, len 48
2020-06-06 14:06:27
142.93.247.221 attackbots
Jun  6 06:11:21 abendstille sshd\[24520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.247.221  user=root
Jun  6 06:11:22 abendstille sshd\[24520\]: Failed password for root from 142.93.247.221 port 41542 ssh2
Jun  6 06:14:52 abendstille sshd\[27837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.247.221  user=root
Jun  6 06:14:53 abendstille sshd\[27837\]: Failed password for root from 142.93.247.221 port 44642 ssh2
Jun  6 06:18:24 abendstille sshd\[31139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.247.221  user=root
...
2020-06-06 14:19:39
115.76.151.3 attackbots
Automatic report - Port Scan Attack
2020-06-06 14:47:50
37.49.226.183 attackspam
$f2bV_matches
2020-06-06 14:21:17
46.38.145.252 attackbots
Jun  6 08:46:44 relay postfix/smtpd\[13145\]: warning: unknown\[46.38.145.252\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 08:47:05 relay postfix/smtpd\[14718\]: warning: unknown\[46.38.145.252\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 08:48:14 relay postfix/smtpd\[11339\]: warning: unknown\[46.38.145.252\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 08:48:35 relay postfix/smtpd\[5589\]: warning: unknown\[46.38.145.252\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 08:49:44 relay postfix/smtpd\[13024\]: warning: unknown\[46.38.145.252\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-06 14:50:59
157.245.64.140 attack
$f2bV_matches
2020-06-06 14:43:02

Recently Reported IPs

104.21.77.19 104.21.77.198 104.21.77.191 104.21.77.196
104.21.77.20 104.21.77.199 104.21.77.204 104.21.77.195
104.21.77.2 104.21.77.200 104.21.77.205 104.21.77.207
104.21.77.208 104.21.77.206 104.21.77.210 104.21.77.214
104.21.77.215 104.21.77.219 104.21.77.218 104.21.77.217