Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.94.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.94.238.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:18:47 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 238.94.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 238.94.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.66.77.230 attackbotsspam
Sep 24 20:16:49 sachi sshd\[2636\]: Invalid user admin from 80.66.77.230
Sep 24 20:16:49 sachi sshd\[2636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.77.230
Sep 24 20:16:51 sachi sshd\[2636\]: Failed password for invalid user admin from 80.66.77.230 port 59666 ssh2
Sep 24 20:21:05 sachi sshd\[2964\]: Invalid user php5 from 80.66.77.230
Sep 24 20:21:05 sachi sshd\[2964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.77.230
2019-09-25 14:21:38
202.142.173.58 attackspam
Scanning and Vuln Attempts
2019-09-25 14:52:04
158.69.192.35 attack
Sep 25 08:05:20 SilenceServices sshd[7350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.35
Sep 25 08:05:22 SilenceServices sshd[7350]: Failed password for invalid user fadl from 158.69.192.35 port 46740 ssh2
Sep 25 08:09:48 SilenceServices sshd[8711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.35
2019-09-25 14:30:40
189.197.60.78 attackbots
RDP Bruteforce
2019-09-25 14:09:04
138.197.166.110 attack
Sep 25 01:39:07 pi01 sshd[4105]: Connection from 138.197.166.110 port 40916 on 192.168.1.10 port 22
Sep 25 01:39:07 pi01 sshd[4105]: Invalid user neighbourhoodbillboard from 138.197.166.110 port 40916
Sep 25 01:39:07 pi01 sshd[4105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.166.110
Sep 25 01:39:09 pi01 sshd[4105]: Failed password for invalid user neighbourhoodbillboard from 138.197.166.110 port 40916 ssh2
Sep 25 01:39:10 pi01 sshd[4105]: Received disconnect from 138.197.166.110 port 40916:11: Bye Bye [preauth]
Sep 25 01:39:10 pi01 sshd[4105]: Disconnected from 138.197.166.110 port 40916 [preauth]
Sep 25 01:56:40 pi01 sshd[4346]: Connection from 138.197.166.110 port 33430 on 192.168.1.10 port 22
Sep 25 01:56:40 pi01 sshd[4346]: Invalid user MGR from 138.197.166.110 port 33430
Sep 25 01:56:40 pi01 sshd[4346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.166.110
Sep 25........
-------------------------------
2019-09-25 14:17:45
192.36.31.199 attack
Automatic report - Port Scan Attack
2019-09-25 14:23:54
78.94.119.186 attackspam
Sep 25 08:43:52 dedicated sshd[30961]: Invalid user hadoop from 78.94.119.186 port 47852
2019-09-25 14:45:10
45.142.195.5 attackspam
Sep 25 08:09:09 relay postfix/smtpd\[24719\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 08:09:41 relay postfix/smtpd\[27634\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 08:10:03 relay postfix/smtpd\[757\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 08:10:34 relay postfix/smtpd\[6422\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 08:10:56 relay postfix/smtpd\[16076\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-25 14:13:42
222.186.42.15 attack
Automated report - ssh fail2ban:
Sep 25 08:23:41 wrong password, user=root, port=54812, ssh2
Sep 25 08:23:45 wrong password, user=root, port=54812, ssh2
Sep 25 08:23:49 wrong password, user=root, port=54812, ssh2
2019-09-25 14:44:48
80.211.2.59 attackbots
Automatic report - Banned IP Access
2019-09-25 14:37:13
121.66.224.90 attackbotsspam
Sep 25 08:11:01 s64-1 sshd[18152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90
Sep 25 08:11:04 s64-1 sshd[18152]: Failed password for invalid user testies from 121.66.224.90 port 45090 ssh2
Sep 25 08:16:12 s64-1 sshd[18301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90
...
2019-09-25 14:21:13
195.154.182.205 attackbotsspam
Sep 24 19:11:48 hanapaa sshd\[25901\]: Invalid user Passw0rd44 from 195.154.182.205
Sep 24 19:11:48 hanapaa sshd\[25901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-182-205.rev.poneytelecom.eu
Sep 24 19:11:50 hanapaa sshd\[25901\]: Failed password for invalid user Passw0rd44 from 195.154.182.205 port 29265 ssh2
Sep 24 19:16:29 hanapaa sshd\[26318\]: Invalid user 123456 from 195.154.182.205
Sep 24 19:16:29 hanapaa sshd\[26318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-182-205.rev.poneytelecom.eu
2019-09-25 14:54:07
162.158.118.216 attack
09/25/2019-05:53:59.554318 162.158.118.216 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-09-25 14:18:48
222.186.175.154 attack
Sep 25 01:59:08 plusreed sshd[15397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Sep 25 01:59:10 plusreed sshd[15397]: Failed password for root from 222.186.175.154 port 58652 ssh2
...
2019-09-25 14:07:43
120.205.45.252 attack
Sep 25 06:21:28 ks10 sshd[5265]: Failed password for root from 120.205.45.252 port 55359 ssh2
...
2019-09-25 14:29:34

Recently Reported IPs

104.21.94.236 104.21.94.24 104.21.94.240 104.21.94.241
104.21.94.243 104.21.94.244 104.21.94.245 104.21.94.248
104.21.94.25 104.21.94.26 104.21.94.252 104.21.94.246
104.21.94.29 104.21.94.247 104.21.94.3 104.21.94.27
104.21.94.28 104.21.94.254 104.21.94.30 104.21.94.32