Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.82.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.82.199.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:03:40 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 199.82.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 199.82.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.248.83.163 attackspam
(sshd) Failed SSH login from 14.248.83.163 (VN/Vietnam/static.vnpt.vn): 10 in the last 3600 secs
2020-03-20 02:49:01
185.143.221.85 attack
Unauthorized connection attempt detected from IP address 185.143.221.85 to port 443
2020-03-20 02:37:14
14.29.177.90 attackspambots
$f2bV_matches
2020-03-20 02:40:32
62.173.140.46 attackbots
massive "Höhle der Löwen" / CryptoCurrency Spam over weeks
2020-03-20 02:45:51
88.229.154.83 attackbotsspam
Port probing on unauthorized port 23
2020-03-20 02:36:01
51.91.212.79 attackspambots
03/19/2020-14:20:26.521734 51.91.212.79 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 52
2020-03-20 02:44:54
104.244.208.228 attack
Port scan on 1 port(s): 25565
2020-03-20 02:48:00
138.68.61.182 attackbotsspam
SSH invalid-user multiple login attempts
2020-03-20 02:28:09
188.187.190.220 attack
Mar 19 18:48:23 srv206 sshd[22057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.187.190.220  user=root
Mar 19 18:48:25 srv206 sshd[22057]: Failed password for root from 188.187.190.220 port 56384 ssh2
...
2020-03-20 02:22:12
222.89.41.203 attackbots
Spammer
2020-03-20 02:05:58
115.68.184.88 attackspambots
Mar 19 15:01:17 ms-srv sshd[33734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.184.88
Mar 19 15:01:19 ms-srv sshd[33734]: Failed password for invalid user oracle from 115.68.184.88 port 51970 ssh2
2020-03-20 02:23:27
77.75.79.32 attackspam
fulltextrobot-77-75-79-32.seznam.cz
THIS .CZ HAS NO BUSINESS AT OUR WEBSITE
2020-03-20 02:43:52
184.105.247.195 attackspam
Unauthorized connection attempt detected from IP address 184.105.247.195 to port 4786
2020-03-20 02:43:00
124.160.83.138 attackspambots
Feb 19 10:36:54 pi sshd[4515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.83.138 
Feb 19 10:36:57 pi sshd[4515]: Failed password for invalid user falcon2 from 124.160.83.138 port 60205 ssh2
2020-03-20 02:16:49
157.230.91.45 attack
Mar 19 15:25:30 tuxlinux sshd[34949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45  user=root
Mar 19 15:25:32 tuxlinux sshd[34949]: Failed password for root from 157.230.91.45 port 60507 ssh2
Mar 19 15:25:30 tuxlinux sshd[34949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45  user=root
Mar 19 15:25:32 tuxlinux sshd[34949]: Failed password for root from 157.230.91.45 port 60507 ssh2
Mar 19 15:27:36 tuxlinux sshd[34978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45  user=root
...
2020-03-20 02:22:40

Recently Reported IPs

104.21.82.196 104.21.82.198 104.21.82.197 104.21.82.2
104.21.82.20 104.21.82.201 104.21.82.202 104.21.82.205
104.21.82.203 104.21.82.207 104.21.82.204 104.21.82.215
104.21.82.213 104.21.82.210 104.21.82.208 104.21.82.217
104.21.82.218 104.21.82.21 104.21.82.219 104.21.82.22