Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.42.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.42.225.			IN	A

;; AUTHORITY SECTION:
.			351	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 22:12:41 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 225.42.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 225.42.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.82.159.248 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-27 01:24:59
139.59.238.14 attackbots
Nov 26 17:49:40 v22018076622670303 sshd\[7005\]: Invalid user euclid123 from 139.59.238.14 port 38986
Nov 26 17:49:40 v22018076622670303 sshd\[7005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.238.14
Nov 26 17:49:42 v22018076622670303 sshd\[7005\]: Failed password for invalid user euclid123 from 139.59.238.14 port 38986 ssh2
...
2019-11-27 01:48:20
159.65.8.65 attack
Nov 26 17:53:33 minden010 sshd[11746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.8.65
Nov 26 17:53:36 minden010 sshd[11746]: Failed password for invalid user rusty from 159.65.8.65 port 46982 ssh2
Nov 26 18:00:48 minden010 sshd[14021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.8.65
...
2019-11-27 02:03:02
64.190.91.203 attackspam
Nov 26 18:12:45 mail sshd[6308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.190.91.203 
Nov 26 18:12:46 mail sshd[6308]: Failed password for invalid user postgres from 64.190.91.203 port 39272 ssh2
Nov 26 18:18:36 mail sshd[7359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.190.91.203
2019-11-27 01:48:58
49.235.92.208 attack
Nov 26 22:12:00 gw1 sshd[24153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208
Nov 26 22:12:02 gw1 sshd[24153]: Failed password for invalid user server from 49.235.92.208 port 42544 ssh2
...
2019-11-27 01:57:46
154.68.39.6 attackbotsspam
Nov 26 18:02:27 mout sshd[11571]: Invalid user admin from 154.68.39.6 port 39300
2019-11-27 02:03:21
142.44.184.79 attackspam
Nov 26 07:05:28 php1 sshd\[13022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.79  user=root
Nov 26 07:05:31 php1 sshd\[13022\]: Failed password for root from 142.44.184.79 port 49812 ssh2
Nov 26 07:11:51 php1 sshd\[13644\]: Invalid user lena from 142.44.184.79
Nov 26 07:11:51 php1 sshd\[13644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.79
Nov 26 07:11:53 php1 sshd\[13644\]: Failed password for invalid user lena from 142.44.184.79 port 59178 ssh2
2019-11-27 01:51:31
94.253.160.5 attackspam
Nov 26 15:39:45 mxgate1 postfix/postscreen[7222]: CONNECT from [94.253.160.5]:33134 to [176.31.12.44]:25
Nov 26 15:39:45 mxgate1 postfix/dnsblog[7223]: addr 94.253.160.5 listed by domain zen.spamhaus.org as 127.0.0.10
Nov 26 15:39:45 mxgate1 postfix/dnsblog[7223]: addr 94.253.160.5 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 26 15:39:45 mxgate1 postfix/dnsblog[7226]: addr 94.253.160.5 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 26 15:39:45 mxgate1 postfix/dnsblog[7227]: addr 94.253.160.5 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 26 15:39:46 mxgate1 postfix/dnsblog[7224]: addr 94.253.160.5 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 26 15:39:51 mxgate1 postfix/postscreen[7222]: DNSBL rank 5 for [94.253.160.5]:33134
Nov x@x
Nov 26 15:39:52 mxgate1 postfix/postscreen[7222]: HANGUP after 1.7 from [94.253.160.5]:33134 in tests after SMTP handshake
Nov 26 15:39:52 mxgate1 postfix/postscreen[7222]: DISCONNECT [94.253.160.5]:33134


........
--------------------------------------
2019-11-27 01:57:01
218.107.154.74 attackbots
Nov 26 20:41:37 areeb-Workstation sshd[23853]: Failed password for root from 218.107.154.74 port 28793 ssh2
...
2019-11-27 02:06:08
121.168.115.36 attack
Invalid user seamark from 121.168.115.36 port 42788
2019-11-27 01:51:54
180.151.43.190 attackspam
Nov 26 15:35:07 venus sshd[29447]: Invalid user dircreate from 180.151.43.190
Nov 26 15:35:07 venus sshd[29447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.151.43.190 
Nov 26 15:35:09 venus sshd[29447]: Failed password for invalid user dircreate from 180.151.43.190 port 32240 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=180.151.43.190
2019-11-27 01:47:06
103.40.163.221 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-27 01:52:54
31.163.246.224 attack
[Tue Nov 26 15:25:33 2019] Failed password for r.r from 31.163.246.224 port 54640 ssh2
[Tue Nov 26 15:25:37 2019] Failed password for r.r from 31.163.246.224 port 54640 ssh2
[Tue Nov 26 15:25:40 2019] Failed password for r.r from 31.163.246.224 port 54640 ssh2
[Tue Nov 26 15:25:41 2019] Failed password for r.r from 31.163.246.224 port 54640 ssh2
[Tue Nov 26 15:25:45 2019] Failed password for r.r from 31.163.246.224 port 54640 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=31.163.246.224
2019-11-27 01:34:28
115.42.122.154 attackspambots
Unauthorised access (Nov 26) SRC=115.42.122.154 LEN=40 TTL=53 ID=31293 TCP DPT=23 WINDOW=28779 SYN
2019-11-27 01:52:23
61.8.69.98 attack
Nov 26 17:47:06 vpn01 sshd[1464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.8.69.98
Nov 26 17:47:08 vpn01 sshd[1464]: Failed password for invalid user die from 61.8.69.98 port 59120 ssh2
...
2019-11-27 01:45:39

Recently Reported IPs

104.21.42.22 104.21.42.226 104.21.42.229 104.21.42.23
104.21.42.231 104.21.42.234 104.21.42.235 104.21.42.236
104.21.42.237 26.218.96.108 104.21.42.245 104.21.42.246
104.21.42.248 104.21.42.25 104.21.42.26 104.21.42.27
104.21.42.28 104.21.42.29 90.62.178.182 104.21.42.3