Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.37.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7378
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.37.137.			IN	A

;; AUTHORITY SECTION:
.			262	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 21:20:40 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 137.37.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.37.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.67 attack
Nov 12 13:33:26 v22018076622670303 sshd\[6181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
Nov 12 13:33:28 v22018076622670303 sshd\[6181\]: Failed password for root from 49.88.112.67 port 12794 ssh2
Nov 12 13:33:30 v22018076622670303 sshd\[6181\]: Failed password for root from 49.88.112.67 port 12794 ssh2
...
2019-11-12 20:57:29
111.20.126.210 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-11-12 20:40:28
182.180.167.249 normal
ASALAM-O-ALIKUM
2019-11-12 21:09:11
78.214.7.20 attackbotsspam
*Port Scan* detected from 78.214.7.20 (FR/France/pty45-1-78-214-7-20.fbx.proxad.net). 11 hits in the last 130 seconds
2019-11-12 21:18:01
47.154.228.133 attack
Nov 12 07:22:20 icinga sshd[19842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.154.228.133 
Nov 12 07:22:20 icinga sshd[19844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.154.228.133 
Nov 12 07:22:22 icinga sshd[19842]: Failed password for invalid user pi from 47.154.228.133 port 54830 ssh2
Nov 12 07:22:22 icinga sshd[19844]: Failed password for invalid user pi from 47.154.228.133 port 54832 ssh2
...
2019-11-12 21:16:06
185.143.223.113 attack
2019-11-12T12:27:21.557896+01:00 lumpi kernel: [3380418.570714] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.113 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=54309 PROTO=TCP SPT=42131 DPT=34981 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-12 20:50:00
103.40.8.170 attackbots
Nov 11 20:37:34 sachi sshd\[31178\]: Invalid user lyndon from 103.40.8.170
Nov 11 20:37:34 sachi sshd\[31178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.40.8.170
Nov 11 20:37:37 sachi sshd\[31178\]: Failed password for invalid user lyndon from 103.40.8.170 port 42086 ssh2
Nov 11 20:42:26 sachi sshd\[31643\]: Invalid user lab from 103.40.8.170
Nov 11 20:42:26 sachi sshd\[31643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.40.8.170
2019-11-12 20:38:48
159.89.134.199 attackspambots
$f2bV_matches
2019-11-12 20:53:46
132.232.48.121 attackspam
<6 unauthorized SSH connections
2019-11-12 21:02:24
27.5.132.158 attack
ROBOT - HACK
2019-11-12 21:05:34
138.94.205.93 attackspambots
Honeypot attack, port: 23, PTR: 138-94-205-93.rev.solnetprovedor.com.br.
2019-11-12 21:13:21
14.102.46.188 attackspambots
Unauthorised access (Nov 12) SRC=14.102.46.188 LEN=52 TTL=112 ID=15830 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-12 21:16:34
119.90.43.106 attack
Nov 12 13:07:24 MK-Soft-VM3 sshd[27508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.43.106 
Nov 12 13:07:25 MK-Soft-VM3 sshd[27508]: Failed password for invalid user cr from 119.90.43.106 port 44790 ssh2
...
2019-11-12 21:09:00
41.90.8.14 attackspam
Nov 12 10:08:42 lnxweb62 sshd[20860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.90.8.14
2019-11-12 20:43:26
209.99.174.14 attackspambots
1,41-04/04 [bc03/m148] PostRequest-Spammer scoring: paris
2019-11-12 21:18:33

Recently Reported IPs

104.21.37.136 104.21.37.143 104.21.37.144 104.21.37.145
104.21.37.148 104.21.37.149 104.21.37.150 12.227.23.179
104.21.37.151 222.106.8.150 104.21.37.152 77.83.245.159
104.21.37.158 104.21.37.159 104.21.37.160 104.21.37.163
104.21.37.168 104.21.37.169 104.21.37.170 104.21.37.171