Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.104.21.36
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.104.21.36.			IN	A

;; AUTHORITY SECTION:
.			372	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112700 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 27 20:18:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 36.21.104.100.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 36.21.104.100.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
207.154.242.83 attack
Invalid user admin from 207.154.242.83 port 58536
2020-09-26 02:35:48
82.196.14.163 attackbots
Invalid user toor from 82.196.14.163 port 58086
2020-09-26 02:19:12
2.51.105.73 attackbots
Invalid user user1 from 2.51.105.73 port 33800
2020-09-26 02:36:56
167.172.156.12 attackspambots
Sep 25 19:40:17 OPSO sshd\[3472\]: Invalid user ftptest from 167.172.156.12 port 32914
Sep 25 19:40:17 OPSO sshd\[3472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.156.12
Sep 25 19:40:19 OPSO sshd\[3472\]: Failed password for invalid user ftptest from 167.172.156.12 port 32914 ssh2
Sep 25 19:44:19 OPSO sshd\[3990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.156.12  user=root
Sep 25 19:44:21 OPSO sshd\[3990\]: Failed password for root from 167.172.156.12 port 44404 ssh2
2020-09-26 02:10:25
68.183.117.247 attackspambots
Automatic report - Banned IP Access
2020-09-26 02:24:12
161.35.122.197 attackbotsspam
Sep 25 19:58:13 rancher-0 sshd[293371]: Invalid user firefart from 161.35.122.197 port 51050
...
2020-09-26 02:14:37
165.22.249.148 attackspam
Invalid user user1 from 165.22.249.148 port 45564
2020-09-26 01:59:38
1.235.192.218 attackspam
frenzy
2020-09-26 02:15:41
100.25.3.151 attackbotsspam
Unauthorized SSH login attempts
2020-09-26 02:02:15
110.88.29.16 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 110.88.29.16 (CN/China/16.29.88.110.broad.sm.fj.dynamic.163data.com.cn): 5 in the last 3600 secs - Sun Aug 26 16:45:02 2018
2020-09-26 02:09:44
125.124.254.31 attackbots
Sep 25 07:05:18 ns382633 sshd\[13741\]: Invalid user manager from 125.124.254.31 port 59830
Sep 25 07:05:19 ns382633 sshd\[13741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.254.31
Sep 25 07:05:20 ns382633 sshd\[13741\]: Failed password for invalid user manager from 125.124.254.31 port 59830 ssh2
Sep 25 07:16:00 ns382633 sshd\[15509\]: Invalid user user from 125.124.254.31 port 42784
Sep 25 07:16:00 ns382633 sshd\[15509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.254.31
2020-09-26 02:25:45
151.80.149.223 attackbots
Invalid user rick from 151.80.149.223 port 55108
2020-09-26 02:06:45
156.236.72.20 attack
Invalid user server from 156.236.72.20 port 37264
2020-09-26 02:33:29
194.165.99.231 attack
Invalid user rtorrent from 194.165.99.231 port 60456
2020-09-26 02:18:29
222.90.86.40 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 47 - Sat Aug 25 15:35:17 2018
2020-09-26 02:21:18

Recently Reported IPs

100.104.122.184 100.104.59.219 100.103.41.117 100.104.66.16
100.105.171.190 100.104.82.185 100.104.208.194 100.108.121.173
100.102.195.157 100.104.33.206 100.104.19.254 100.106.21.213
100.103.81.248 100.105.249.17 100.11.186.105 100.105.142.199
100.104.170.102 100.105.43.199 100.104.99.5 100.104.129.112