Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.40.87
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.40.87.			IN	A

;; AUTHORITY SECTION:
.			210	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 21:59:29 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 87.40.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 87.40.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.44.66.99 attackbots
Invalid user moj from 185.44.66.99 port 44642
2020-03-31 14:25:44
114.67.80.209 attack
Mar 31 00:06:34 ny01 sshd[11027]: Failed password for root from 114.67.80.209 port 37972 ssh2
Mar 31 00:10:52 ny01 sshd[12098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.209
Mar 31 00:10:54 ny01 sshd[12098]: Failed password for invalid user apex from 114.67.80.209 port 37722 ssh2
2020-03-31 14:12:10
186.185.231.18 attackbots
IP address logged by my Netflix account after the individual hacked into and locked me out of my account. Individual also changed my account settings to the most expensive plan, which allows multiple people (profiles) to watch, and several profiles were added. The name on my account was changed to "Juan". I contacted Netflix to have my account restored, so I was able to see the various IP addresses used. I will report all of them as well.
2020-03-31 13:51:29
148.72.232.142 attackspam
Automatic report - XMLRPC Attack
2020-03-31 14:17:07
2.61.249.208 attackbotsspam
" "
2020-03-31 13:43:24
45.80.64.246 attackbotsspam
Mar 31 00:53:50 ws24vmsma01 sshd[128685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246
Mar 31 00:53:52 ws24vmsma01 sshd[128685]: Failed password for invalid user wuyan from 45.80.64.246 port 54644 ssh2
...
2020-03-31 13:45:31
37.114.187.129 attackbotsspam
/wp-json/visualizer/v1/update-chart
2020-03-31 13:53:18
157.230.249.122 attackspam
Automatic report - XMLRPC Attack
2020-03-31 14:13:57
203.6.237.234 attackspam
Invalid user gdp from 203.6.237.234 port 42022
2020-03-31 14:22:10
114.67.100.234 attack
Mar 31 03:53:21 *** sshd[14396]: User root from 114.67.100.234 not allowed because not listed in AllowUsers
2020-03-31 14:09:30
104.131.46.166 attack
Invalid user willetta from 104.131.46.166 port 56974
2020-03-31 14:19:28
103.253.42.38 attackspambots
Automatic report - Port Scan Attack
2020-03-31 13:57:02
156.96.62.83 attackspam
Unauthorized connection attempt detected from IP address 156.96.62.83 to port 25
2020-03-31 14:14:18
138.197.71.200 attackspambots
port
2020-03-31 13:55:53
65.182.2.241 attackbots
Invalid user sin from 65.182.2.241 port 56760
2020-03-31 14:05:04

Recently Reported IPs

104.21.40.86 104.21.40.88 104.21.40.89 104.21.40.94
104.21.41.100 104.21.41.104 104.21.41.108 104.21.41.117
199.62.63.85 104.21.41.125 104.21.41.126 104.21.41.127
104.21.41.128 104.21.41.131 21.223.167.160 104.21.41.132
104.21.41.134 104.21.41.140 104.21.41.143 203.71.171.4