Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.77.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1393
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.77.197.			IN	A

;; AUTHORITY SECTION:
.			177	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 11:42:04 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 197.77.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.77.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.201.148 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-30 07:50:42
138.68.53.163 attack
Nov 29 13:49:35 kapalua sshd\[4053\]: Invalid user guest from 138.68.53.163
Nov 29 13:49:35 kapalua sshd\[4053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.53.163
Nov 29 13:49:37 kapalua sshd\[4053\]: Failed password for invalid user guest from 138.68.53.163 port 57754 ssh2
Nov 29 13:52:58 kapalua sshd\[4332\]: Invalid user skef from 138.68.53.163
Nov 29 13:52:58 kapalua sshd\[4332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.53.163
2019-11-30 07:55:57
14.225.11.29 attack
RDPBruteFlS24
2019-11-30 08:00:16
112.85.42.171 attackspam
Nov 30 01:12:49 nextcloud sshd\[12769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.171  user=root
Nov 30 01:12:51 nextcloud sshd\[12769\]: Failed password for root from 112.85.42.171 port 27919 ssh2
Nov 30 01:13:01 nextcloud sshd\[12769\]: Failed password for root from 112.85.42.171 port 27919 ssh2
...
2019-11-30 08:13:26
125.213.224.250 attack
firewall-block, port(s): 1433/tcp
2019-11-30 07:54:22
170.106.36.56 attackspam
" "
2019-11-30 08:16:02
218.92.0.138 attackspambots
2019-11-30T00:01:46.056563abusebot-2.cloudsearch.cf sshd\[10210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
2019-11-30 08:03:46
49.235.73.221 attack
Nov 29 13:16:54 tdfoods sshd\[778\]: Invalid user 444 from 49.235.73.221
Nov 29 13:16:54 tdfoods sshd\[778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.73.221
Nov 29 13:16:56 tdfoods sshd\[778\]: Failed password for invalid user 444 from 49.235.73.221 port 48970 ssh2
Nov 29 13:20:21 tdfoods sshd\[1019\]: Invalid user acacia from 49.235.73.221
Nov 29 13:20:21 tdfoods sshd\[1019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.73.221
2019-11-30 07:59:06
45.141.84.25 attackbots
Nov 30 00:20:28 herz-der-gamer sshd[7514]: Invalid user admin from 45.141.84.25 port 8071
...
2019-11-30 07:52:51
217.182.139.169 attack
RDP brute force attack detected by fail2ban
2019-11-30 08:01:06
188.165.219.27 attackspambots
Nov 30 00:20:09 lnxmail61 postfix/smtpd[8673]: warning: [munged]:[188.165.219.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 30 00:20:09 lnxmail61 postfix/smtpd[8673]: lost connection after AUTH from [munged]:[188.165.219.27]
Nov 30 00:20:15 lnxmail61 postfix/smtpd[7321]: warning: [munged]:[188.165.219.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 30 00:20:15 lnxmail61 postfix/smtpd[7321]: lost connection after AUTH from [munged]:[188.165.219.27]
Nov 30 00:20:25 lnxmail61 postfix/smtpd[16700]: warning: [munged]:[188.165.219.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 30 00:20:25 lnxmail61 postfix/smtpd[16700]: lost connection after AUTH from [munged]:[188.165.219.27]
2019-11-30 07:56:54
27.69.242.187 attackspam
Nov 30 00:42:21 fr01 sshd[29551]: Invalid user guest from 27.69.242.187
Nov 30 00:42:22 fr01 sshd[29551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.69.242.187
Nov 30 00:42:21 fr01 sshd[29551]: Invalid user guest from 27.69.242.187
Nov 30 00:42:24 fr01 sshd[29551]: Failed password for invalid user guest from 27.69.242.187 port 51802 ssh2
Nov 30 00:42:51 fr01 sshd[29594]: Invalid user test from 27.69.242.187
...
2019-11-30 07:47:22
42.51.217.27 attackbotsspam
30.11.2019 00:20:50 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-11-30 07:42:39
104.206.128.38 attack
firewall-block, port(s): 3389/tcp
2019-11-30 07:59:44
68.48.240.245 attack
Nov 29 13:32:32 auw2 sshd\[11444\]: Invalid user skulstad from 68.48.240.245
Nov 29 13:32:32 auw2 sshd\[11444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-68-48-240-245.hsd1.mi.comcast.net
Nov 29 13:32:35 auw2 sshd\[11444\]: Failed password for invalid user skulstad from 68.48.240.245 port 52536 ssh2
Nov 29 13:35:38 auw2 sshd\[11681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-68-48-240-245.hsd1.mi.comcast.net  user=root
Nov 29 13:35:40 auw2 sshd\[11681\]: Failed password for root from 68.48.240.245 port 59916 ssh2
2019-11-30 07:44:44

Recently Reported IPs

104.21.77.190 104.21.77.201 104.21.77.202 104.21.77.209
104.21.77.203 104.21.77.213 104.21.77.232 104.21.77.48
104.21.77.216 104.21.77.67 104.21.77.73 104.21.77.71
104.21.77.51 104.21.77.83 104.21.77.91 104.21.77.3
104.21.77.74 104.21.77.98 104.21.77.85 104.21.77.89