Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.80.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.80.108.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:00:41 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 108.80.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.80.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.205.105.181 attack
Nov 23 05:23:50 w sshd[31058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.205.105.181.dynamic.adsl.gvt.net.br  user=r.r
Nov 23 05:23:52 w sshd[31058]: Failed password for r.r from 177.205.105.181 port 49483 ssh2
Nov 23 05:23:52 w sshd[31058]: Received disconnect from 177.205.105.181: 11: Bye Bye [preauth]
Nov 23 05:32:59 w sshd[31115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.205.105.181.dynamic.adsl.gvt.net.br  user=r.r
Nov 23 05:33:01 w sshd[31115]: Failed password for r.r from 177.205.105.181 port 49178 ssh2
Nov 23 05:33:02 w sshd[31115]: Received disconnect from 177.205.105.181: 11: Bye Bye [preauth]
Nov 23 05:37:31 w sshd[31135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.205.105.181.dynamic.adsl.gvt.net.br  user=r.r
Nov 23 05:37:33 w sshd[31135]: Failed password for r.r from 177.205.105.181 port 39182 ssh2
Nov 23 05:3........
-------------------------------
2019-11-23 17:54:17
36.155.113.40 attackspambots
2019-11-23T09:14:16.420146abusebot-3.cloudsearch.cf sshd\[7917\]: Invalid user mysql from 36.155.113.40 port 51957
2019-11-23 17:23:47
52.231.153.23 attackbots
Nov 23 10:04:59 vmd26974 sshd[7988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.153.23
Nov 23 10:05:02 vmd26974 sshd[7988]: Failed password for invalid user qhsupport from 52.231.153.23 port 59124 ssh2
...
2019-11-23 17:34:15
202.150.157.158 attackspambots
2019-11-23T06:25:54.601Z CLOSE host=202.150.157.158 port=51603 fd=5 time=70.059 bytes=102
...
2019-11-23 17:43:06
93.152.159.11 attackspam
Nov 22 22:06:47 php1 sshd\[2249\]: Invalid user bellow from 93.152.159.11
Nov 22 22:06:47 php1 sshd\[2249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.152.159.11
Nov 22 22:06:48 php1 sshd\[2249\]: Failed password for invalid user bellow from 93.152.159.11 port 48220 ssh2
Nov 22 22:10:38 php1 sshd\[2730\]: Invalid user greifer from 93.152.159.11
Nov 22 22:10:38 php1 sshd\[2730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.152.159.11
2019-11-23 17:25:07
139.59.169.37 attack
Nov 23 08:54:01 localhost sshd\[801\]: Invalid user cromwell from 139.59.169.37 port 33752
Nov 23 08:54:01 localhost sshd\[801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.37
Nov 23 08:54:03 localhost sshd\[801\]: Failed password for invalid user cromwell from 139.59.169.37 port 33752 ssh2
2019-11-23 17:50:41
71.6.199.23 attackbots
11/23/2019-04:12:43.367418 71.6.199.23 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2019-11-23 17:37:04
51.38.112.45 attackbots
Invalid user guest from 51.38.112.45 port 41916
2019-11-23 17:48:34
86.178.164.69 attack
Automatic report - Port Scan Attack
2019-11-23 17:32:48
222.186.175.169 attack
Nov 23 10:59:42 jane sshd[20919]: Failed password for root from 222.186.175.169 port 42092 ssh2
Nov 23 10:59:47 jane sshd[20919]: Failed password for root from 222.186.175.169 port 42092 ssh2
...
2019-11-23 17:59:55
167.71.60.209 attackspambots
Nov 23 08:30:34 mout sshd[32721]: Invalid user vrajala from 167.71.60.209 port 45790
2019-11-23 17:31:48
139.162.104.208 attackspam
Unauthorised access (Nov 23) SRC=139.162.104.208 LEN=40 TTL=245 ID=54321 TCP DPT=21 WINDOW=65535 SYN 
Unauthorised access (Nov 22) SRC=139.162.104.208 LEN=40 PREC=0x20 TTL=238 ID=54321 TCP DPT=21 WINDOW=65535 SYN 
Unauthorised access (Nov 17) SRC=139.162.104.208 LEN=40 PREC=0x20 TTL=236 ID=54321 TCP DPT=21 WINDOW=65535 SYN
2019-11-23 17:38:51
91.221.7.161 attack
Port 1433 Scan
2019-11-23 17:39:19
165.227.9.184 attack
Nov 23 07:21:44 sbg01 sshd[15180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.9.184
Nov 23 07:21:45 sbg01 sshd[15180]: Failed password for invalid user merci from 165.227.9.184 port 61831 ssh2
Nov 23 07:25:42 sbg01 sshd[15196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.9.184
2019-11-23 17:51:25
114.67.236.219 attackbotsspam
Port Scan 1433
2019-11-23 17:29:07

Recently Reported IPs

104.21.8.97 104.21.80.100 104.21.80.102 104.21.80.109
104.21.80.106 104.21.80.110 104.21.80.111 104.21.80.112
104.21.80.117 104.21.80.116 104.21.80.120 104.21.80.125
104.21.80.127 104.21.80.123 104.21.80.13 104.21.80.121
104.21.80.12 104.21.80.130 104.21.80.132 104.21.80.134