Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.42.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23534
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.42.227.			IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:10:03 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 227.42.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 227.42.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.48.193.7 attack
Aug 29 16:02:32 hanapaa sshd\[31952\]: Invalid user xtreme from 103.48.193.7
Aug 29 16:02:32 hanapaa sshd\[31952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.193.7
Aug 29 16:02:34 hanapaa sshd\[31952\]: Failed password for invalid user xtreme from 103.48.193.7 port 42504 ssh2
Aug 29 16:07:40 hanapaa sshd\[32379\]: Invalid user tomcat from 103.48.193.7
Aug 29 16:07:40 hanapaa sshd\[32379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.193.7
2019-08-30 12:20:36
103.28.57.86 attackbots
Aug 29 18:18:26 hcbb sshd\[18249\]: Invalid user sanga from 103.28.57.86
Aug 29 18:18:26 hcbb sshd\[18249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.57.86
Aug 29 18:18:28 hcbb sshd\[18249\]: Failed password for invalid user sanga from 103.28.57.86 port 21123 ssh2
Aug 29 18:23:06 hcbb sshd\[18653\]: Invalid user elephant from 103.28.57.86
Aug 29 18:23:06 hcbb sshd\[18653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.57.86
2019-08-30 12:34:13
200.196.249.170 attackbots
$f2bV_matches
2019-08-30 12:35:07
173.225.102.166 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-30 02:19:18,417 INFO [amun_request_handler] PortScan Detected on Port: 25 (173.225.102.166)
2019-08-30 12:17:29
37.59.99.243 attackbots
Aug 30 05:49:41 root sshd[25530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.99.243 
Aug 30 05:49:43 root sshd[25530]: Failed password for invalid user sunset from 37.59.99.243 port 30296 ssh2
Aug 30 05:53:18 root sshd[25569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.99.243 
...
2019-08-30 11:55:10
106.75.153.43 attackbots
Aug 30 05:45:11 eventyay sshd[8301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.153.43
Aug 30 05:45:13 eventyay sshd[8301]: Failed password for invalid user st@rb0und from 106.75.153.43 port 56534 ssh2
Aug 30 05:50:25 eventyay sshd[9569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.153.43
...
2019-08-30 12:24:00
209.160.120.221 attackspambots
(From keith@chiromarketinginc.org) Hi,

Are You Struggling to Grow Your Chiropractic Clinic? With 24,000 Google Searches for Chiropractors EVERY SINGLE DAY, Are YOU Making Sure to Keep Your Clinic in front of People Who Want Your Services? 

chiromarketinginc.org is an agency for Chiropractors focused on getting you 3X more patients by using the power of Social Media & Google Ads. 1000+ Chiro Clinics are using these proven methods to generate more patients online. We have a 14-day free trial to give you the confidence you need. 

The internet is filled with an audience who can be in your next patient list. Will you take action? 

Please email me at keith@chiromarketinginc.org & we will get on a quick call to set up your Free Trial. 

Keith Williams
keith@chiromarketinginc.org
www.chiromarketinginc.org
2019-08-30 12:09:56
193.70.2.117 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-08-30 12:29:57
188.165.243.162 attack
Faked Googlebot
2019-08-30 12:25:54
95.219.213.54 attackspam
Hits on port : 445
2019-08-30 12:26:51
217.30.75.78 attackbotsspam
Aug 30 06:00:11 ubuntu-2gb-nbg1-dc3-1 sshd[16870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.30.75.78
Aug 30 06:00:14 ubuntu-2gb-nbg1-dc3-1 sshd[16870]: Failed password for invalid user sfsu from 217.30.75.78 port 44265 ssh2
...
2019-08-30 12:15:39
190.210.42.209 attackspam
Aug 29 23:56:52 TORMINT sshd\[8212\]: Invalid user cmbi from 190.210.42.209
Aug 29 23:56:52 TORMINT sshd\[8212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209
Aug 29 23:56:54 TORMINT sshd\[8212\]: Failed password for invalid user cmbi from 190.210.42.209 port 3836 ssh2
...
2019-08-30 12:04:20
115.94.38.82 attackspambots
Tried sshing with brute force.
2019-08-30 12:33:45
138.219.220.235 attackbotsspam
Aug 29 22:16:21 xeon postfix/smtpd[37542]: warning: unknown[138.219.220.235]: SASL PLAIN authentication failed: authentication failure
2019-08-30 12:06:42
143.0.58.173 attackspambots
2019-08-30T10:53:33.758840enmeeting.mahidol.ac.th sshd\[7145\]: Invalid user delta from 143.0.58.173 port 19194
2019-08-30T10:53:33.778081enmeeting.mahidol.ac.th sshd\[7145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.0.58.173
2019-08-30T10:53:35.813030enmeeting.mahidol.ac.th sshd\[7145\]: Failed password for invalid user delta from 143.0.58.173 port 19194 ssh2
...
2019-08-30 12:26:19

Recently Reported IPs

104.21.42.222 104.21.42.242 104.21.42.187 104.21.42.60
104.21.42.7 104.21.42.75 104.21.42.66 13.225.71.127
104.21.42.81 104.21.42.87 104.21.42.88 104.21.42.93
104.21.43.104 104.21.42.9 104.21.42.97 104.21.43.11
104.21.43.107 104.21.43.109 104.21.43.116 104.21.43.139