Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.36.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.36.42.			IN	A

;; AUTHORITY SECTION:
.			325	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:38:03 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 42.36.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.36.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.118.14.82 attackspambots
2019-06-22 17:15:33 1hehjn-0000Fs-T8 SMTP connection from \(\[101.118.14.82\]\) \[101.118.14.82\]:15650 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 17:15:46 1hehk0-0000G1-Ft SMTP connection from \(\[101.118.14.82\]\) \[101.118.14.82\]:15737 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 17:15:57 1hehkB-0000GM-RX SMTP connection from \(\[101.118.14.82\]\) \[101.118.14.82\]:15818 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-06-01 20:50:21
117.173.67.119 attackspambots
May 30 19:53:53 serwer sshd\[17327\]: Invalid user hpreform from 117.173.67.119 port 3509
May 30 19:53:53 serwer sshd\[17327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119
May 30 19:53:55 serwer sshd\[17327\]: Failed password for invalid user hpreform from 117.173.67.119 port 3509 ssh2
May 30 20:07:08 serwer sshd\[19177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119  user=admin
May 30 20:07:10 serwer sshd\[19177\]: Failed password for admin from 117.173.67.119 port 3510 ssh2
May 30 20:09:22 serwer sshd\[19769\]: Invalid user kadrir from 117.173.67.119 port 3511
May 30 20:09:22 serwer sshd\[19769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119
May 30 20:09:24 serwer sshd\[19769\]: Failed password for invalid user kadrir from 117.173.67.119 port 3511 ssh2
May 30 20:13:41 serwer sshd\[20223\]: pam_unix\(ssh
...
2020-06-01 20:55:01
170.150.72.28 attack
Jun  1 14:05:15 eventyay sshd[1536]: Failed password for root from 170.150.72.28 port 51402 ssh2
Jun  1 14:07:24 eventyay sshd[1568]: Failed password for root from 170.150.72.28 port 53390 ssh2
...
2020-06-01 20:43:09
106.12.220.84 attack
Jun  1 12:17:57 vlre-nyc-1 sshd\[12160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.220.84  user=root
Jun  1 12:17:59 vlre-nyc-1 sshd\[12160\]: Failed password for root from 106.12.220.84 port 46832 ssh2
Jun  1 12:21:04 vlre-nyc-1 sshd\[12251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.220.84  user=root
Jun  1 12:21:06 vlre-nyc-1 sshd\[12251\]: Failed password for root from 106.12.220.84 port 46942 ssh2
Jun  1 12:23:42 vlre-nyc-1 sshd\[12327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.220.84  user=root
...
2020-06-01 21:00:55
45.148.11.173 attackspambots
spam
2020-06-01 20:56:02
139.155.93.180 attackbots
Jun  1 14:20:58 inter-technics sshd[12922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.93.180  user=root
Jun  1 14:21:00 inter-technics sshd[12922]: Failed password for root from 139.155.93.180 port 51652 ssh2
Jun  1 14:23:57 inter-technics sshd[13118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.93.180  user=root
Jun  1 14:23:59 inter-technics sshd[13118]: Failed password for root from 139.155.93.180 port 45768 ssh2
Jun  1 14:26:58 inter-technics sshd[13396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.93.180  user=root
Jun  1 14:27:00 inter-technics sshd[13396]: Failed password for root from 139.155.93.180 port 39940 ssh2
...
2020-06-01 21:04:37
171.100.142.26 attackspam
Dovecot Invalid User Login Attempt.
2020-06-01 21:16:05
43.255.71.195 attackbots
Jun  1 14:37:32 vps647732 sshd[23379]: Failed password for root from 43.255.71.195 port 38428 ssh2
...
2020-06-01 20:55:32
222.186.173.154 attackspambots
Jun  1 14:50:56 legacy sshd[10090]: Failed password for root from 222.186.173.154 port 3262 ssh2
Jun  1 14:50:59 legacy sshd[10090]: Failed password for root from 222.186.173.154 port 3262 ssh2
Jun  1 14:51:08 legacy sshd[10090]: Failed password for root from 222.186.173.154 port 3262 ssh2
Jun  1 14:51:08 legacy sshd[10090]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 3262 ssh2 [preauth]
...
2020-06-01 20:59:36
79.137.34.248 attackspam
Jun  1 12:00:26 vlre-nyc-1 sshd\[11536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.34.248  user=root
Jun  1 12:00:28 vlre-nyc-1 sshd\[11536\]: Failed password for root from 79.137.34.248 port 42640 ssh2
Jun  1 12:05:53 vlre-nyc-1 sshd\[11764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.34.248  user=root
Jun  1 12:05:55 vlre-nyc-1 sshd\[11764\]: Failed password for root from 79.137.34.248 port 53939 ssh2
Jun  1 12:09:38 vlre-nyc-1 sshd\[11902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.34.248  user=root
...
2020-06-01 20:39:24
51.68.11.195 attack
CMS (WordPress or Joomla) login attempt.
2020-06-01 21:17:02
117.50.7.253 attackbotsspam
May 30 13:10:42 mail sshd[20526]: Failed password for root from 117.50.7.253 port 43474 ssh2
...
2020-06-01 20:57:28
106.54.9.63 attackspam
Lines containing failures of 106.54.9.63 (max 1000)
Jun  1 12:51:58 localhost sshd[9139]: User r.r from 106.54.9.63 not allowed because listed in DenyUsers
Jun  1 12:51:58 localhost sshd[9139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.9.63  user=r.r
Jun  1 12:52:01 localhost sshd[9139]: Failed password for invalid user r.r from 106.54.9.63 port 39226 ssh2
Jun  1 12:52:02 localhost sshd[9139]: Received disconnect from 106.54.9.63 port 39226:11: Bye Bye [preauth]
Jun  1 12:52:02 localhost sshd[9139]: Disconnected from invalid user r.r 106.54.9.63 port 39226 [preauth]
Jun  1 12:56:07 localhost sshd[10044]: User r.r from 106.54.9.63 not allowed because listed in DenyUsers
Jun  1 12:56:07 localhost sshd[10044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.9.63  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.54.9.63
2020-06-01 21:10:56
222.186.175.23 attackspambots
Jun  1 09:18:48 plusreed sshd[4062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
Jun  1 09:18:50 plusreed sshd[4062]: Failed password for root from 222.186.175.23 port 19760 ssh2
...
2020-06-01 21:20:22
152.32.102.15 attack
fake orders on web store
2020-06-01 20:39:30

Recently Reported IPs

104.21.36.35 104.21.36.54 104.21.36.66 104.21.36.84
104.21.36.37 104.21.36.89 104.21.36.7 104.21.36.98
128.14.75.197 104.21.36.64 104.21.37.100 104.21.37.106
104.21.37.110 104.21.37.114 104.21.37.142 104.21.37.115
104.21.37.146 104.21.37.164 104.21.37.156 104.21.37.176