Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.94.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54995
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.94.56.			IN	A

;; AUTHORITY SECTION:
.			149	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 11:42:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 56.94.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.94.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
208.100.26.229 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-07-26 05:57:54
123.152.215.244 attackbotsspam
23/tcp
[2019-07-25]1pkt
2019-07-26 06:07:37
124.150.132.79 attackbots
124.150.132.79 - - [25/Jul/2019:23:12:08 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
124.150.132.79 - - [25/Jul/2019:23:12:09 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
124.150.132.79 - - [25/Jul/2019:23:12:11 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
124.150.132.79 - - [25/Jul/2019:23:12:12 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
124.150.132.79 - - [25/Jul/2019:23:12:13 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
124.150.132.79 - - [25/Jul/2019:23:12:15 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-26 06:00:07
66.109.227.65 attackspambots
Automatic report - Port Scan Attack
2019-07-26 06:27:10
107.148.101.20 attack
445/tcp
[2019-07-25]1pkt
2019-07-26 06:08:03
188.166.246.46 attackspambots
Automatic report - Banned IP Access
2019-07-26 06:34:58
46.105.54.20 attack
Triggered by Fail2Ban at Ares web server
2019-07-26 06:21:50
109.239.49.168 attack
Automatic report - Banned IP Access
2019-07-26 06:02:39
79.157.240.57 attack
Invalid user su from 79.157.240.57 port 50048
2019-07-26 06:05:36
139.198.122.76 attack
Automatic report - Banned IP Access
2019-07-26 05:57:00
62.205.157.162 attackspambots
RDP brute force attack detected by fail2ban
2019-07-26 06:17:59
220.254.161.116 attackbotsspam
23/tcp
[2019-07-25]1pkt
2019-07-26 06:12:39
169.239.218.24 attackbots
243"or(1,2)=(select*from(selectname_const(CHAR(111,108,111,108,111,115,104,101,114),1),name_const(CHAR(111,108,111,108,111,115,104,101,114),1))a)--"x"="x
2019-07-26 06:03:22
217.150.43.129 attackbotsspam
[portscan] Port scan
2019-07-26 06:08:17
143.204.192.98 attackspambots
TCP Port: 443 _    invalid blocked zen-spamhaus rbldns-ru _  _ Client xx.xx.4.90 _ _ (430)
2019-07-26 06:11:01

Recently Reported IPs

104.21.94.175 104.21.94.53 104.21.94.59 104.21.94.251
104.21.96.47 104.21.95.176 104.210.0.72 104.21.96.43
104.21.96.93 104.21.94.169 104.211.11.213 104.211.200.148
104.211.2.177 104.210.3.230 104.210.13.21 104.211.34.244
104.210.65.18 104.211.73.119 104.214.112.138 104.211.56.142