Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.44.21.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52461
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.44.21.217.			IN	A

;; AUTHORITY SECTION:
.			185	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021401 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 15 07:04:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
217.21.44.104.in-addr.arpa domain name pointer be-162-0.ibr04.bl7.ntwk.msn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
217.21.44.104.in-addr.arpa	name = be-162-0.ibr04.bl7.ntwk.msn.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.245.193.75 attackbotsspam
Nov 10 23:08:20 lcl-usvr-02 sshd[23163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.193.75  user=root
Nov 10 23:08:22 lcl-usvr-02 sshd[23163]: Failed password for root from 157.245.193.75 port 61146 ssh2
...
2019-11-11 03:11:36
138.68.53.163 attackbots
Nov 10 18:20:48 dedicated sshd[18172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.53.163  user=root
Nov 10 18:20:50 dedicated sshd[18172]: Failed password for root from 138.68.53.163 port 34026 ssh2
2019-11-11 03:03:44
14.232.208.115 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 9 - port: 1433 proto: TCP cat: Misc Attack
2019-11-11 03:08:13
185.176.27.190 attack
Multiport scan : 7 ports scanned 3391 3393 3395 3396 3397 3398 3399
2019-11-11 02:39:34
187.7.230.28 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-11-11 03:00:18
51.75.52.127 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 41 - port: 3405 proto: TCP cat: Misc Attack
2019-11-11 03:06:49
132.232.94.184 attackspam
Multiport scan : 8 ports scanned 80 6379 6380 7001 7002 8080 8088 9200
2019-11-11 02:45:12
80.82.78.100 attackbots
firewall-block, port(s): 1088/udp, 1157/udp
2019-11-11 02:53:21
60.172.5.98 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 51 - port: 23 proto: TCP cat: Misc Attack
2019-11-11 02:55:05
176.107.130.183 attack
11/10/2019-11:55:52.319560 176.107.130.183 Protocol: 17 ET SCAN Sipvicious Scan
2019-11-11 02:43:45
111.68.101.165 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-11-11 02:45:56
92.53.90.132 attack
Port Scan: TCP/5927
2019-11-11 03:04:24
89.248.174.193 attackbots
Multiport scan : 5 ports scanned 9200 9443 9600 10000 10001
2019-11-11 02:49:35
81.22.45.51 attackbots
11/10/2019-13:41:11.398828 81.22.45.51 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-11 02:52:11
185.209.0.58 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 8829 proto: TCP cat: Misc Attack
2019-11-11 02:38:20

Recently Reported IPs

219.102.131.226 38.2.141.130 11.86.206.61 167.211.6.38
102.105.152.61 206.109.94.163 152.134.102.86 42.143.59.160
235.232.45.145 69.14.69.180 215.8.4.212 150.193.203.146
216.117.247.85 150.75.150.155 113.82.189.169 234.246.131.105
109.133.165.254 127.9.19.3 39.248.145.242 80.58.88.133