Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.81.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.81.19.			IN	A

;; AUTHORITY SECTION:
.			96	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:20:24 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 19.81.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.81.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.154.255.44 attack
Automatic report - Banned IP Access
2019-11-09 09:02:36
49.88.112.111 attack
Nov  9 05:57:53 gw1 sshd[28643]: Failed password for root from 49.88.112.111 port 21544 ssh2
...
2019-11-09 09:07:25
5.189.176.250 attackbotsspam
Nov  8 06:14:32 server sshd\[19482\]: Failed password for invalid user admin from 5.189.176.250 port 1545 ssh2
Nov  9 00:43:01 server sshd\[20501\]: Invalid user admin from 5.189.176.250
Nov  9 00:43:01 server sshd\[20501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.176.250 
Nov  9 00:43:04 server sshd\[20501\]: Failed password for invalid user admin from 5.189.176.250 port 40201 ssh2
Nov  9 03:03:57 server sshd\[25753\]: Invalid user admin from 5.189.176.250
...
2019-11-09 09:02:51
117.102.105.180 attack
Nov  9 01:33:03 bouncer sshd\[8456\]: Invalid user admin from 117.102.105.180 port 48649
Nov  9 01:33:03 bouncer sshd\[8456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.105.180 
Nov  9 01:33:05 bouncer sshd\[8456\]: Failed password for invalid user admin from 117.102.105.180 port 48649 ssh2
...
2019-11-09 09:06:11
159.65.112.93 attackspam
Automatic report - Banned IP Access
2019-11-09 09:05:39
207.154.239.128 attack
2019-11-09T04:55:36.435188abusebot-8.cloudsearch.cf sshd\[10793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.239.128  user=root
2019-11-09 13:20:45
111.231.54.248 attackbotsspam
Nov  9 01:41:35 dedicated sshd[10790]: Invalid user agus123 from 111.231.54.248 port 39938
2019-11-09 08:54:12
220.130.178.36 attackbotsspam
2019-11-09T06:50:27.185175tmaserv sshd\[16984\]: Invalid user seldon from 220.130.178.36 port 52316
2019-11-09T06:50:27.189463tmaserv sshd\[16984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-130-178-36.hinet-ip.hinet.net
2019-11-09T06:50:29.825632tmaserv sshd\[16984\]: Failed password for invalid user seldon from 220.130.178.36 port 52316 ssh2
2019-11-09T06:54:18.294320tmaserv sshd\[17183\]: Invalid user ahlf from 220.130.178.36 port 60384
2019-11-09T06:54:18.296963tmaserv sshd\[17183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-130-178-36.hinet-ip.hinet.net
2019-11-09T06:54:20.002654tmaserv sshd\[17183\]: Failed password for invalid user ahlf from 220.130.178.36 port 60384 ssh2
...
2019-11-09 13:18:08
189.115.92.79 attackbots
Nov  9 01:15:53 ns37 sshd[16968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.115.92.79
2019-11-09 09:00:09
182.52.22.6 attackbots
Unauthorised access (Nov  9) SRC=182.52.22.6 LEN=52 TTL=114 ID=17499 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-09 13:05:42
218.104.231.2 attackbotsspam
Nov  9 05:36:46 mail sshd[27231]: Failed password for root from 218.104.231.2 port 37369 ssh2
Nov  9 05:55:50 mail sshd[28275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.231.2
...
2019-11-09 13:09:58
43.240.127.90 attack
$f2bV_matches
2019-11-09 08:53:19
34.65.62.214 attackspambots
http://irina94.rusgirls.cn/
Received:from vnnic.vn ([1.52.61.241])
Subject:I want to love you! Are you ready?
2019-11-09 13:13:29
138.68.50.18 attack
Nov  9 05:55:58 lnxmysql61 sshd[12753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.50.18
2019-11-09 13:04:56
192.210.227.137 attack
spam FO
2019-11-09 13:17:28

Recently Reported IPs

104.21.81.208 104.21.81.216 104.21.81.221 104.21.81.210
104.21.81.200 13.225.71.89 104.21.81.215 104.21.81.218
104.21.81.237 104.21.81.27 104.21.81.231 104.21.81.26
104.21.81.3 104.21.81.34 104.21.81.31 104.21.81.252
104.21.81.36 104.21.81.42 104.21.81.51 104.21.81.71