Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.225.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27499
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.225.55.			IN	A

;; AUTHORITY SECTION:
.			520	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030300 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 01:35:38 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 55.225.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.225.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.232.65 attackspambots
Jun 10 22:27:29 OPSO sshd\[11997\]: Invalid user liubaimin from 106.13.232.65 port 38360
Jun 10 22:27:29 OPSO sshd\[11997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.65
Jun 10 22:27:31 OPSO sshd\[11997\]: Failed password for invalid user liubaimin from 106.13.232.65 port 38360 ssh2
Jun 10 22:30:48 OPSO sshd\[13008\]: Invalid user Mailis from 106.13.232.65 port 57394
Jun 10 22:30:48 OPSO sshd\[13008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.65
2020-06-11 04:59:30
58.87.67.226 attack
2020-06-10T20:23:55.959584shield sshd\[10407\]: Invalid user wuyanzhou from 58.87.67.226 port 54770
2020-06-10T20:23:55.963689shield sshd\[10407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.67.226
2020-06-10T20:23:57.933962shield sshd\[10407\]: Failed password for invalid user wuyanzhou from 58.87.67.226 port 54770 ssh2
2020-06-10T20:27:27.587088shield sshd\[10947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.67.226  user=root
2020-06-10T20:27:29.326708shield sshd\[10947\]: Failed password for root from 58.87.67.226 port 39008 ssh2
2020-06-11 04:41:24
51.79.115.186 attack
Port scan on 1 port(s): 445
2020-06-11 05:03:50
144.172.79.5 attackspam
Jun 10 22:40:45 h1745522 sshd[28530]: Invalid user honey from 144.172.79.5 port 55794
Jun 10 22:40:45 h1745522 sshd[28530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.79.5
Jun 10 22:40:45 h1745522 sshd[28530]: Invalid user honey from 144.172.79.5 port 55794
Jun 10 22:40:47 h1745522 sshd[28530]: Failed password for invalid user honey from 144.172.79.5 port 55794 ssh2
Jun 10 22:40:48 h1745522 sshd[28536]: Invalid user admin from 144.172.79.5 port 60098
Jun 10 22:40:48 h1745522 sshd[28536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.79.5
Jun 10 22:40:48 h1745522 sshd[28536]: Invalid user admin from 144.172.79.5 port 60098
Jun 10 22:40:50 h1745522 sshd[28536]: Failed password for invalid user admin from 144.172.79.5 port 60098 ssh2
Jun 10 22:40:51 h1745522 sshd[28541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.79.5  user=root
Jun 10
...
2020-06-11 04:54:26
148.70.125.42 attackspambots
Jun 10 19:57:47 vlre-nyc-1 sshd\[10457\]: Invalid user selnagar from 148.70.125.42
Jun 10 19:57:47 vlre-nyc-1 sshd\[10457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.125.42
Jun 10 19:57:50 vlre-nyc-1 sshd\[10457\]: Failed password for invalid user selnagar from 148.70.125.42 port 49964 ssh2
Jun 10 20:07:24 vlre-nyc-1 sshd\[10627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.125.42  user=root
Jun 10 20:07:27 vlre-nyc-1 sshd\[10627\]: Failed password for root from 148.70.125.42 port 34160 ssh2
...
2020-06-11 04:57:42
91.238.72.79 attack
Automatic report - XMLRPC Attack
2020-06-11 04:52:24
118.180.251.9 attackbotsspam
Jun 10 21:24:08 PorscheCustomer sshd[7056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.180.251.9
Jun 10 21:24:09 PorscheCustomer sshd[7056]: Failed password for invalid user p@33w0rd!@ from 118.180.251.9 port 43144 ssh2
Jun 10 21:26:23 PorscheCustomer sshd[7115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.180.251.9
...
2020-06-11 04:37:42
222.186.180.223 attack
Jun 10 22:29:35 ns381471 sshd[10288]: Failed password for root from 222.186.180.223 port 55064 ssh2
Jun 10 22:29:49 ns381471 sshd[10288]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 55064 ssh2 [preauth]
2020-06-11 04:33:05
120.92.166.166 attack
Jun 10 20:03:04 localhost sshd[119338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.166.166  user=root
Jun 10 20:03:06 localhost sshd[119338]: Failed password for root from 120.92.166.166 port 4775 ssh2
Jun 10 20:06:29 localhost sshd[119748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.166.166  user=root
Jun 10 20:06:31 localhost sshd[119748]: Failed password for root from 120.92.166.166 port 30567 ssh2
Jun 10 20:09:40 localhost sshd[120170]: Invalid user earl from 120.92.166.166 port 56359
...
2020-06-11 04:53:50
195.162.64.104 attackspam
Jun 10 20:26:29 ip-172-31-61-156 sshd[18670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.162.64.104
Jun 10 20:26:29 ip-172-31-61-156 sshd[18670]: Invalid user admin from 195.162.64.104
Jun 10 20:26:32 ip-172-31-61-156 sshd[18670]: Failed password for invalid user admin from 195.162.64.104 port 60497 ssh2
Jun 10 20:32:27 ip-172-31-61-156 sshd[18945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.162.64.104  user=root
Jun 10 20:32:29 ip-172-31-61-156 sshd[18945]: Failed password for root from 195.162.64.104 port 33720 ssh2
...
2020-06-11 04:43:26
14.29.126.58 attackspambots
1591817180 - 06/10/2020 21:26:20 Host: 14.29.126.58/14.29.126.58 Port: 445 TCP Blocked
2020-06-11 04:39:46
83.97.20.35 attack
Jun 10 22:21:00 debian-2gb-nbg1-2 kernel: \[14079189.608927\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=83.97.20.35 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=33783 DPT=9333 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-11 04:28:44
222.99.52.216 attackspambots
Jun 10 22:11:39 eventyay sshd[20002]: Failed password for root from 222.99.52.216 port 60139 ssh2
Jun 10 22:15:27 eventyay sshd[20172]: Failed password for root from 222.99.52.216 port 62554 ssh2
...
2020-06-11 04:47:46
180.76.168.54 attackspam
Jun 11 00:51:27 gw1 sshd[9537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.168.54
Jun 11 00:51:29 gw1 sshd[9537]: Failed password for invalid user brian from 180.76.168.54 port 52822 ssh2
...
2020-06-11 04:46:09
116.196.73.159 attackbots
Jun 10 16:26:33 ny01 sshd[8742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.73.159
Jun 10 16:26:34 ny01 sshd[8742]: Failed password for invalid user i2b2demodata from 116.196.73.159 port 33740 ssh2
Jun 10 16:29:51 ny01 sshd[9256]: Failed password for root from 116.196.73.159 port 57640 ssh2
2020-06-11 04:40:09

Recently Reported IPs

104.21.224.236 104.21.228.15 104.21.236.109 104.21.239.45
244.202.102.223 238.230.58.239 177.218.109.193 104.21.42.90
220.228.203.104 104.21.65.227 104.210.14.162 104.210.159.127
104.211.61.5 104.211.81.32 104.214.20.17 104.214.89.95
104.214.90.132 104.216.103.100 104.216.103.101 139.114.178.218