Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.80.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10989
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.80.185.			IN	A

;; AUTHORITY SECTION:
.			281	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:01:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 185.80.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 185.80.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.51.83.207 attackbots
Port scan detected on ports: 1433[TCP], 1433[TCP], 1433[TCP]
2020-04-28 06:32:48
72.79.13.98 attack
Honeypot Spam Send
2020-04-28 06:11:50
222.110.165.141 attackspambots
Apr 27 23:01:33 pkdns2 sshd\[46906\]: Invalid user bill from 222.110.165.141Apr 27 23:01:34 pkdns2 sshd\[46906\]: Failed password for invalid user bill from 222.110.165.141 port 55550 ssh2Apr 27 23:06:15 pkdns2 sshd\[47165\]: Invalid user wordpress from 222.110.165.141Apr 27 23:06:17 pkdns2 sshd\[47165\]: Failed password for invalid user wordpress from 222.110.165.141 port 37460 ssh2Apr 27 23:10:54 pkdns2 sshd\[47372\]: Invalid user buscador from 222.110.165.141Apr 27 23:10:56 pkdns2 sshd\[47372\]: Failed password for invalid user buscador from 222.110.165.141 port 47606 ssh2
...
2020-04-28 06:20:54
47.223.114.69 attackspam
SSH Invalid Login
2020-04-28 06:15:11
51.159.52.209 attackbotsspam
Apr 28 00:10:38 mail sshd[21892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.159.52.209
Apr 28 00:10:40 mail sshd[21892]: Failed password for invalid user user from 51.159.52.209 port 39090 ssh2
Apr 28 00:15:28 mail sshd[22837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.159.52.209
2020-04-28 06:33:17
129.226.123.66 attackspam
2020-04-27T15:13:32.430886linuxbox-skyline sshd[3620]: Invalid user svn from 129.226.123.66 port 37600
...
2020-04-28 06:24:15
27.78.14.83 attack
reported_by_cryptodad
2020-04-28 06:06:03
54.37.75.16 attack
Apr 28 00:16:27 prox sshd[30925]: Failed password for root from 54.37.75.16 port 50678 ssh2
2020-04-28 06:29:09
58.37.214.154 attackbotsspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-28 06:28:26
87.251.74.241 attackspambots
Multiport scan : 34 ports scanned 41 66 104 213 230 264 274 313 319 417 436 472 579 593 612 624 631 634 648 650 662 669 686 705 740 742 749 761 768 800 851 870 894 979
2020-04-28 06:20:24
178.128.83.204 attackbotsspam
SSH Brute-Force Attack
2020-04-28 06:04:44
36.26.72.16 attack
2020-04-27T20:19:28.044070abusebot-6.cloudsearch.cf sshd[688]: Invalid user nba from 36.26.72.16 port 55704
2020-04-27T20:19:28.049888abusebot-6.cloudsearch.cf sshd[688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.72.16
2020-04-27T20:19:28.044070abusebot-6.cloudsearch.cf sshd[688]: Invalid user nba from 36.26.72.16 port 55704
2020-04-27T20:19:29.894391abusebot-6.cloudsearch.cf sshd[688]: Failed password for invalid user nba from 36.26.72.16 port 55704 ssh2
2020-04-27T20:25:06.459063abusebot-6.cloudsearch.cf sshd[1074]: Invalid user ts3server from 36.26.72.16 port 56884
2020-04-27T20:25:06.466571abusebot-6.cloudsearch.cf sshd[1074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.72.16
2020-04-27T20:25:06.459063abusebot-6.cloudsearch.cf sshd[1074]: Invalid user ts3server from 36.26.72.16 port 56884
2020-04-27T20:25:08.381059abusebot-6.cloudsearch.cf sshd[1074]: Failed password for invalid us
...
2020-04-28 06:08:28
107.170.39.154 attackspambots
Invalid user irene from 107.170.39.154 port 49874
2020-04-28 06:10:05
34.207.11.241 attackbots
[Mon Apr 27 09:25:53 2020] - DDoS Attack From IP: 34.207.11.241 Port: 80
2020-04-28 06:28:41
123.207.8.86 attack
SSH Invalid Login
2020-04-28 06:32:19

Recently Reported IPs

104.21.80.180 104.21.80.183 104.21.80.187 104.21.80.19
104.21.80.188 104.21.80.186 104.21.80.190 104.21.80.191
104.21.80.192 104.21.80.195 104.21.80.194 104.21.80.193
104.21.80.20 104.21.80.197 241.171.24.92 104.21.80.201
104.21.80.202 104.21.80.205 104.21.80.203 104.21.80.207