Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.172.104.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42233
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.172.104.2.			IN	A

;; AUTHORITY SECTION:
.			298	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100200 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 02 20:16:07 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 2.104.172.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.104.172.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.131.39.193 attackspam
Aug 10 20:42:06 inter-technics sshd[16964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.39.193  user=root
Aug 10 20:42:08 inter-technics sshd[16964]: Failed password for root from 104.131.39.193 port 33052 ssh2
Aug 10 20:45:54 inter-technics sshd[17156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.39.193  user=root
Aug 10 20:45:55 inter-technics sshd[17156]: Failed password for root from 104.131.39.193 port 44554 ssh2
Aug 10 20:49:38 inter-technics sshd[17333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.39.193  user=root
Aug 10 20:49:40 inter-technics sshd[17333]: Failed password for root from 104.131.39.193 port 56048 ssh2
...
2020-08-11 02:59:04
87.123.224.200 attackspambots
Automatic report - Port Scan Attack
2020-08-11 03:26:24
1.171.129.121 attackbots
Unauthorised access (Aug 10) SRC=1.171.129.121 LEN=52 TTL=109 ID=30668 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-11 03:30:49
45.231.12.37 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-10T16:19:06Z and 2020-08-10T16:26:27Z
2020-08-11 03:22:24
198.199.73.239 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-11 03:14:40
198.27.80.123 attackspam
198.27.80.123 - - [10/Aug/2020:21:08:47 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [10/Aug/2020:21:08:51 +0200] "POST /wp-login.php HTTP/1.1" 200 5379 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [10/Aug/2020:21:08:57 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [10/Aug/2020:21:08:58 +0200] "POST /wp-login.php HTTP/1.1" 200 5379 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [10/Aug/2020:21:09:03 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safar
...
2020-08-11 03:17:32
183.233.143.22 attackspambots
Dovecot Invalid User Login Attempt.
2020-08-11 03:12:29
188.166.23.215 attackbotsspam
Aug 10 01:52:04 vm0 sshd[19214]: Failed password for root from 188.166.23.215 port 60452 ssh2
Aug 10 14:01:46 vm0 sshd[8566]: Failed password for root from 188.166.23.215 port 34948 ssh2
...
2020-08-11 03:17:57
84.17.47.66 attackbotsspam
(From no-replyredge@google.com) Gооd dаy! 
If you want to get ahead of your competition, have a higher Domain Authority score. Its just simple as that. 
With our service you get Domain Authority above 50 points in just 30 days. 
 
This service is guaranteed 
 
For more information, check our service here 
https://www.monkeydigital.co/Get-Guaranteed-Domain-Authority-50/ 
 
thank you 
Mike  
Monkey Digital 
support@monkeydigital.co
2020-08-11 03:11:12
188.165.42.223 attack
Aug 10 17:43:59 django-0 sshd[23519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip223.ip-188-165-42.eu  user=root
Aug 10 17:44:01 django-0 sshd[23519]: Failed password for root from 188.165.42.223 port 36022 ssh2
...
2020-08-11 03:21:32
159.65.138.161 attackbotsspam
Fail2Ban Ban Triggered
2020-08-11 03:05:23
103.69.218.146 attack
Unauthorized connection attempt from IP address 103.69.218.146 on Port 445(SMB)
2020-08-11 03:23:48
51.77.230.49 attackbotsspam
$f2bV_matches
2020-08-11 03:20:18
58.57.4.238 attackspam
Attempted Brute Force (dovecot)
2020-08-11 03:04:35
196.41.122.94 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-11 03:09:33

Recently Reported IPs

77.162.222.3 127.168.33.141 4.242.3.32 13.73.21.208
213.166.96.35 85.145.112.196 99.219.227.71 166.170.37.14
47.98.225.1 125.253.58.17 209.249.2.242 240.91.1.51
42.33.148.205 142.180.173.28 123.251.96.31 173.95.10.147
122.58.211.67 89.64.89.79 165.171.2.115 39.78.157.198