Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.37.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.37.132.			IN	A

;; AUTHORITY SECTION:
.			197	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 09:51:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 132.37.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.37.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.189.91.97 attack
Dec 19 17:20:07 MainVPS sshd[975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.91.97  user=root
Dec 19 17:20:09 MainVPS sshd[975]: Failed password for root from 206.189.91.97 port 41022 ssh2
Dec 19 17:29:51 MainVPS sshd[20452]: Invalid user kirkes from 206.189.91.97 port 60724
Dec 19 17:29:51 MainVPS sshd[20452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.91.97
Dec 19 17:29:51 MainVPS sshd[20452]: Invalid user kirkes from 206.189.91.97 port 60724
Dec 19 17:29:52 MainVPS sshd[20452]: Failed password for invalid user kirkes from 206.189.91.97 port 60724 ssh2
...
2019-12-20 00:40:32
117.50.35.2 attackspambots
Port scan blocked
8 minutes ago

Feature:
Firewall

A port scan was detected and blocked.
Remote IP:117.50.35.2
2019-12-20 00:37:55
103.27.61.222 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-20 00:45:57
104.244.75.244 attack
Dec 19 06:32:39 hpm sshd\[3769\]: Invalid user admin from 104.244.75.244
Dec 19 06:32:39 hpm sshd\[3769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.75.244
Dec 19 06:32:41 hpm sshd\[3769\]: Failed password for invalid user admin from 104.244.75.244 port 39758 ssh2
Dec 19 06:38:49 hpm sshd\[4365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.75.244  user=news
Dec 19 06:38:51 hpm sshd\[4365\]: Failed password for news from 104.244.75.244 port 46626 ssh2
2019-12-20 00:55:02
190.13.129.34 attackspam
Dec 19 20:55:21 gw1 sshd[26828]: Failed password for mysql from 190.13.129.34 port 55490 ssh2
...
2019-12-20 00:44:48
91.207.107.220 attack
[portscan] Port scan
2019-12-20 01:10:45
41.78.81.249 attack
Unauthorized connection attempt detected from IP address 41.78.81.249 to port 445
2019-12-20 01:03:05
178.62.228.122 attack
178.62.228.122 - - [19/Dec/2019:16:18:24 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.228.122 - - [19/Dec/2019:16:18:25 +0100] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.228.122 - - [19/Dec/2019:16:18:30 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.228.122 - - [19/Dec/2019:16:18:36 +0100] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.228.122 - - [19/Dec/2019:16:18:41 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.228.122 - - [19/Dec/2019:16:18:41 +0100] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-20 00:42:13
189.125.2.234 attackbotsspam
Dec 19 17:32:24 mail sshd[10898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.2.234 
Dec 19 17:32:26 mail sshd[10898]: Failed password for invalid user render from 189.125.2.234 port 27679 ssh2
Dec 19 17:39:26 mail sshd[11977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.2.234
2019-12-20 00:52:21
36.88.51.220 attackbotsspam
Unauthorised access (Dec 19) SRC=36.88.51.220 LEN=52 TTL=116 ID=32754 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-20 01:04:42
96.54.228.119 attackspambots
$f2bV_matches
2019-12-20 01:11:41
211.38.244.205 attack
2019-12-16 01:22:20,452 fail2ban.actions        [806]: NOTICE  [sshd] Ban 211.38.244.205
2019-12-19 08:14:28,819 fail2ban.actions        [806]: NOTICE  [sshd] Ban 211.38.244.205
2019-12-19 11:39:47,520 fail2ban.actions        [806]: NOTICE  [sshd] Ban 211.38.244.205
...
2019-12-20 00:53:05
82.117.190.170 attackbotsspam
Dec 19 17:42:46 cp sshd[21789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.117.190.170
2019-12-20 01:00:09
134.175.9.235 attackspam
Dec 19 17:51:45 vps691689 sshd[31607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.9.235
Dec 19 17:51:47 vps691689 sshd[31607]: Failed password for invalid user test from 134.175.9.235 port 55726 ssh2
...
2019-12-20 01:09:56
125.128.140.114 attackspam
Dec 19 15:36:52 grey postfix/smtpd\[15051\]: NOQUEUE: reject: RCPT from unknown\[125.128.140.114\]: 554 5.7.1 Service unavailable\; Client host \[125.128.140.114\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[125.128.140.114\]\; from=\ to=\ proto=ESMTP helo=\<\[125.128.140.114\]\>
...
2019-12-20 01:13:23

Recently Reported IPs

104.21.37.129 86.227.203.80 104.21.37.134 104.21.37.14
104.21.37.174 104.21.37.180 104.21.37.191 104.21.37.194
104.21.37.197 207.156.48.240 104.21.37.200 252.64.164.217
104.21.37.212 104.21.37.217 104.21.37.239 104.21.37.253
104.21.37.27 104.21.37.34 104.21.37.52 104.21.37.62