Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.40.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44413
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.40.215.			IN	A

;; AUTHORITY SECTION:
.			140	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:09:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 215.40.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.40.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.215.176.153 attack
ICMP MH Probe, Scan /Distributed -
2020-02-14 01:14:51
157.37.238.174 attackbotsspam
Lines containing failures of 157.37.238.174
Feb 13 15:18:13 dns01 sshd[17744]: Invalid user admin from 157.37.238.174 port 61305
Feb 13 15:18:13 dns01 sshd[17744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.37.238.174
Feb 13 15:18:15 dns01 sshd[17744]: Failed password for invalid user admin from 157.37.238.174 port 61305 ssh2
Feb 13 15:18:15 dns01 sshd[17744]: Connection closed by invalid user admin 157.37.238.174 port 61305 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=157.37.238.174
2020-02-14 01:15:20
8.28.0.17 attackbots
ICMP MH Probe, Scan /Distributed -
2020-02-14 01:32:15
185.53.88.78 attackbots
Port 5097 scan denied
2020-02-14 01:01:48
178.128.220.8 attackspam
Automatic report - XMLRPC Attack
2020-02-14 00:55:23
202.131.227.60 attackspam
Feb 13 17:58:15 silence02 sshd[31045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.227.60
Feb 13 17:58:18 silence02 sshd[31045]: Failed password for invalid user eddie from 202.131.227.60 port 37800 ssh2
Feb 13 18:06:58 silence02 sshd[2388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.227.60
2020-02-14 01:29:55
163.172.119.161 attackspambots
Looking for resource vulnerabilities
2020-02-14 01:31:43
148.66.133.91 attackspambots
Invalid user scpuser from 148.66.133.91 port 55928
2020-02-14 01:26:41
14.215.176.178 attackbots
ICMP MH Probe, Scan /Distributed -
2020-02-14 00:57:13
89.72.51.20 attack
2020-02-13T08:53:52.548653linuxbox-skyline sshd[18838]: Invalid user test2 from 89.72.51.20 port 49760
...
2020-02-14 01:11:04
178.62.108.111 attack
Feb 13 21:11:21 gw1 sshd[13451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.108.111
Feb 13 21:11:23 gw1 sshd[13451]: Failed password for invalid user hoosier from 178.62.108.111 port 44536 ssh2
...
2020-02-14 01:17:02
42.119.63.215 attack
1581601657 - 02/13/2020 14:47:37 Host: 42.119.63.215/42.119.63.215 Port: 445 TCP Blocked
2020-02-14 01:33:27
118.24.173.104 attackspambots
Feb 13 16:29:02 legacy sshd[28292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104
Feb 13 16:29:04 legacy sshd[28292]: Failed password for invalid user rostenkowski from 118.24.173.104 port 46362 ssh2
Feb 13 16:33:31 legacy sshd[28574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104
...
2020-02-14 00:58:45
195.56.253.49 attackbots
Feb 13 17:07:11 MK-Soft-VM7 sshd[27440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.56.253.49 
Feb 13 17:07:11 MK-Soft-VM7 sshd[27442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.56.253.49 
...
2020-02-14 00:52:48
71.6.146.186 attackspambots
Port 3541 scan denied
2020-02-14 01:20:29

Recently Reported IPs

104.21.40.143 104.21.40.223 104.21.40.217 104.21.40.239
104.21.40.235 104.21.40.248 104.21.40.27 104.21.40.30
104.21.40.37 104.21.40.49 104.21.40.25 104.21.40.38
104.21.40.50 104.21.40.54 104.21.40.61 104.21.40.59
104.21.40.68 104.21.40.67 13.225.71.122 104.21.40.71