Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.38.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.38.157.			IN	A

;; AUTHORITY SECTION:
.			516	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:32:33 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 157.38.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.38.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.25.47.130 attackbots
...
2020-04-12 04:42:13
218.92.0.165 attackbots
Apr 11 16:16:31 ny01 sshd[6223]: Failed password for root from 218.92.0.165 port 37043 ssh2
Apr 11 16:16:44 ny01 sshd[6223]: error: maximum authentication attempts exceeded for root from 218.92.0.165 port 37043 ssh2 [preauth]
Apr 11 16:16:54 ny01 sshd[6281]: Failed password for root from 218.92.0.165 port 11459 ssh2
2020-04-12 04:17:07
178.33.45.156 attack
Apr 11 19:50:49 cvbnet sshd[29883]: Failed password for root from 178.33.45.156 port 34516 ssh2
...
2020-04-12 04:54:14
106.13.144.164 attackbots
IP blocked
2020-04-12 04:25:38
129.28.198.22 attackspambots
(sshd) Failed SSH login from 129.28.198.22 (CN/China/-): 5 in the last 3600 secs
2020-04-12 04:19:46
27.34.91.50 attackbots
Autoban   27.34.91.50 AUTH/CONNECT
2020-04-12 04:38:54
103.83.36.101 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-04-12 04:48:00
164.132.204.113 attack
Brute force attack against VPN service
2020-04-12 04:53:12
182.18.161.253 attackspambots
Apr 11 14:05:04 vps333114 sshd[3526]: Failed password for root from 182.18.161.253 port 39316 ssh2
Apr 11 14:15:38 vps333114 sshd[3824]: Invalid user betty from 182.18.161.253
...
2020-04-12 04:40:13
178.93.53.197 attackspambots
Unauthorized connection attempt detected from IP address 178.93.53.197 to port 8080
2020-04-12 04:21:46
165.227.96.190 attackspam
Invalid user ubuntu from 165.227.96.190 port 53142
2020-04-12 04:36:11
176.31.191.173 attackspam
$f2bV_matches
2020-04-12 04:48:40
185.13.114.31 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-12 04:45:37
35.237.12.174 attack
Automatic report - WordPress Brute Force
2020-04-12 04:50:53
49.232.51.237 attackbotsspam
5x Failed Password
2020-04-12 04:30:33

Recently Reported IPs

104.21.38.181 104.21.38.151 104.21.38.235 104.21.38.237
104.21.38.242 236.225.48.92 104.18.23.88 104.21.38.196
104.18.23.98 104.18.230.240 104.18.230.8 185.239.106.183
104.18.231.221 104.21.4.95 104.21.4.73 104.21.40.119
104.21.40.12 104.21.4.46 104.21.4.58 104.21.40.116