Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.42.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51883
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.42.166.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 22:10:46 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 166.42.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.42.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.72.84 attack
Aug 18 10:55:31 webhost01 sshd[18349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.72.84
Aug 18 10:55:32 webhost01 sshd[18349]: Failed password for invalid user packet from 178.128.72.84 port 59110 ssh2
...
2020-08-18 13:56:53
122.255.5.42 attackspambots
2020-08-17T21:55:27.454311linuxbox-skyline sshd[153186]: Invalid user bcd from 122.255.5.42 port 38316
...
2020-08-18 14:04:51
123.231.166.226 attackbotsspam
Unauthorised access (Aug 18) SRC=123.231.166.226 LEN=52 TOS=0x08 PREC=0x20 TTL=111 ID=22950 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-18 14:04:34
91.121.173.41 attackspam
Aug 17 19:43:37 eddieflores sshd\[6788\]: Invalid user dge from 91.121.173.41
Aug 17 19:43:37 eddieflores sshd\[6788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.173.41
Aug 17 19:43:39 eddieflores sshd\[6788\]: Failed password for invalid user dge from 91.121.173.41 port 45912 ssh2
Aug 17 19:47:04 eddieflores sshd\[7082\]: Invalid user sdv from 91.121.173.41
Aug 17 19:47:04 eddieflores sshd\[7082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.173.41
2020-08-18 14:00:23
212.70.149.68 attack
Aug 17 21:12:46 nirvana postfix/smtpd[20174]: connect from unknown[212.70.149.68]
Aug 17 21:13:12 nirvana postfix/smtpd[20203]: connect from unknown[212.70.149.68]
Aug 17 21:13:12 nirvana postfix/smtpd[20204]: connect from unknown[212.70.149.68]
Aug 17 21:13:13 nirvana postfix/smtpd[20205]: connect from unknown[212.70.149.68]
Aug 17 21:13:13 nirvana postfix/smtpd[20206]: connect from unknown[212.70.149.68]
Aug 17 21:13:29 nirvana postfix/smtpd[20174]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: authentication failure
Aug 17 21:13:32 nirvana postfix/smtpd[20174]: lost connection after AUTH from unknown[212.70.149.68]
Aug 17 21:13:32 nirvana postfix/smtpd[20174]: disconnect from unknown[212.70.149.68]
Aug 17 21:13:38 nirvana postfix/smtpd[20203]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: authentication failure
Aug 17 21:13:48 nirvana postfix/smtpd[20203]: lost connection after AUTH from unknown[212.70.149.68]
Aug 17 21:13:48........
-------------------------------
2020-08-18 13:46:19
61.91.178.34 attack
2020-08-18 13:49:58
5.101.107.190 attackbots
2020-08-17 22:53:37.488769-0500  localhost sshd[36136]: Failed password for invalid user marina from 5.101.107.190 port 56162 ssh2
2020-08-18 14:22:56
104.236.124.45 attackbots
2020-08-18T07:05:13.917030vps773228.ovh.net sshd[9752]: Failed password for root from 104.236.124.45 port 36490 ssh2
2020-08-18T07:10:36.733352vps773228.ovh.net sshd[9808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.124.45  user=root
2020-08-18T07:10:39.605577vps773228.ovh.net sshd[9808]: Failed password for root from 104.236.124.45 port 60825 ssh2
2020-08-18T07:16:02.988712vps773228.ovh.net sshd[9890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.124.45  user=root
2020-08-18T07:16:04.611997vps773228.ovh.net sshd[9890]: Failed password for root from 104.236.124.45 port 56940 ssh2
...
2020-08-18 14:09:48
197.255.160.225 attackspam
Invalid user michael from 197.255.160.225 port 55978
2020-08-18 14:12:01
122.51.64.150 attackbots
Aug 18 06:16:16 ns382633 sshd\[12946\]: Invalid user newuser from 122.51.64.150 port 51654
Aug 18 06:16:16 ns382633 sshd\[12946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.64.150
Aug 18 06:16:18 ns382633 sshd\[12946\]: Failed password for invalid user newuser from 122.51.64.150 port 51654 ssh2
Aug 18 06:20:00 ns382633 sshd\[13249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.64.150  user=root
Aug 18 06:20:01 ns382633 sshd\[13249\]: Failed password for root from 122.51.64.150 port 39590 ssh2
2020-08-18 13:53:30
123.108.50.164 attack
Aug 17 22:20:24 mockhub sshd[6604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.50.164
Aug 17 22:20:26 mockhub sshd[6604]: Failed password for invalid user qin from 123.108.50.164 port 22380 ssh2
...
2020-08-18 13:29:32
202.102.90.21 attackspam
Aug 18 06:20:36 vmd36147 sshd[3227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.102.90.21
Aug 18 06:20:37 vmd36147 sshd[3227]: Failed password for invalid user florian from 202.102.90.21 port 37422 ssh2
...
2020-08-18 13:53:43
68.183.236.92 attack
Invalid user hyd from 68.183.236.92 port 33908
2020-08-18 14:21:28
191.162.242.181 attack
2020-08-18T03:46:47.502546abusebot-5.cloudsearch.cf sshd[9922]: Invalid user abhijit from 191.162.242.181 port 62017
2020-08-18T03:46:47.508797abusebot-5.cloudsearch.cf sshd[9922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.162.242.181
2020-08-18T03:46:47.502546abusebot-5.cloudsearch.cf sshd[9922]: Invalid user abhijit from 191.162.242.181 port 62017
2020-08-18T03:46:49.985269abusebot-5.cloudsearch.cf sshd[9922]: Failed password for invalid user abhijit from 191.162.242.181 port 62017 ssh2
2020-08-18T03:55:32.038823abusebot-5.cloudsearch.cf sshd[9981]: Invalid user oracle from 191.162.242.181 port 47809
2020-08-18T03:55:32.045070abusebot-5.cloudsearch.cf sshd[9981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.162.242.181
2020-08-18T03:55:32.038823abusebot-5.cloudsearch.cf sshd[9981]: Invalid user oracle from 191.162.242.181 port 47809
2020-08-18T03:55:34.260753abusebot-5.cloudsearch.cf sshd
...
2020-08-18 13:55:36
178.137.162.133 attackspambots
Attempts spam post to comment form - stupid bot.
2020-08-18 14:14:08

Recently Reported IPs

242.9.220.148 104.21.42.180 104.21.42.19 104.21.42.191
104.21.42.192 183.195.164.222 104.21.42.194 104.21.42.2
104.21.42.20 172.15.203.39 104.21.42.204 104.21.42.21
95.246.233.124 104.21.42.212 104.21.42.214 159.217.146.101
104.21.42.216 104.21.42.217 104.21.42.218 104.21.42.22