Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.42.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.42.46.			IN	A

;; AUTHORITY SECTION:
.			283	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:29:51 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 46.42.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 46.42.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.215.80.81 attackbots
1581460024 - 02/11/2020 23:27:04 Host: 218.215.80.81/218.215.80.81 Port: 23 TCP Blocked
2020-02-12 08:36:58
200.158.179.37 attackbots
Automatic report - Port Scan Attack
2020-02-12 08:41:08
40.73.39.195 attackspambots
Feb 11 13:22:02 web9 sshd\[14590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.39.195  user=root
Feb 11 13:22:04 web9 sshd\[14590\]: Failed password for root from 40.73.39.195 port 39412 ssh2
Feb 11 13:24:24 web9 sshd\[14899\]: Invalid user daniel from 40.73.39.195
Feb 11 13:24:24 web9 sshd\[14899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.39.195
Feb 11 13:24:25 web9 sshd\[14899\]: Failed password for invalid user daniel from 40.73.39.195 port 55994 ssh2
2020-02-12 07:59:18
92.63.194.106 attackbots
SSH Brute Force
2020-02-12 08:23:12
222.173.30.130 attack
Feb 12 00:55:16 [host] sshd[1877]: Invalid user Ad
Feb 12 00:55:16 [host] sshd[1877]: pam_unix(sshd:a
Feb 12 00:55:18 [host] sshd[1877]: Failed password
2020-02-12 08:22:57
119.161.156.11 attack
Feb 12 00:51:00 sd-53420 sshd\[9803\]: Invalid user jobe from 119.161.156.11
Feb 12 00:51:00 sd-53420 sshd\[9803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.161.156.11
Feb 12 00:51:02 sd-53420 sshd\[9803\]: Failed password for invalid user jobe from 119.161.156.11 port 34472 ssh2
Feb 12 00:53:27 sd-53420 sshd\[10093\]: User root from 119.161.156.11 not allowed because none of user's groups are listed in AllowGroups
Feb 12 00:53:27 sd-53420 sshd\[10093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.161.156.11  user=root
...
2020-02-12 08:06:44
47.74.230.86 attack
Feb 11 13:50:11 hpm sshd\[30778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.230.86  user=root
Feb 11 13:50:13 hpm sshd\[30778\]: Failed password for root from 47.74.230.86 port 42146 ssh2
Feb 11 13:53:56 hpm sshd\[31261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.230.86  user=root
Feb 11 13:53:57 hpm sshd\[31261\]: Failed password for root from 47.74.230.86 port 43884 ssh2
Feb 11 13:57:37 hpm sshd\[31937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.230.86  user=root
2020-02-12 08:19:42
173.245.239.178 attackspambots
failed_logins
2020-02-12 08:14:32
104.244.78.197 attack
Feb 11 01:34:43 : SSH login attempts with invalid user
2020-02-12 08:19:22
181.169.168.204 attackspam
Feb 12 02:30:18 intra sshd\[39536\]: Invalid user samhammer from 181.169.168.204Feb 12 02:30:21 intra sshd\[39536\]: Failed password for invalid user samhammer from 181.169.168.204 port 37997 ssh2Feb 12 02:32:47 intra sshd\[39552\]: Invalid user shanti from 181.169.168.204Feb 12 02:32:49 intra sshd\[39552\]: Failed password for invalid user shanti from 181.169.168.204 port 52763 ssh2Feb 12 02:35:10 intra sshd\[39594\]: Invalid user ivan from 181.169.168.204Feb 12 02:35:12 intra sshd\[39594\]: Failed password for invalid user ivan from 181.169.168.204 port 60736 ssh2
...
2020-02-12 08:43:09
49.236.195.150 attackbots
2020-02-11T23:26:53.2575501240 sshd\[30397\]: Invalid user zsimeonova from 49.236.195.150 port 37838
2020-02-11T23:26:53.2604701240 sshd\[30397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.195.150
2020-02-11T23:26:55.2763611240 sshd\[30397\]: Failed password for invalid user zsimeonova from 49.236.195.150 port 37838 ssh2
...
2020-02-12 08:43:24
182.75.104.140 attackspambots
" "
2020-02-12 08:13:08
117.34.70.27 attack
Lines containing failures of 117.34.70.27
Feb 10 11:11:36 kmh-vmh-001-fsn05 sshd[16603]: Invalid user ygr from 117.34.70.27 port 41657
Feb 10 11:11:36 kmh-vmh-001-fsn05 sshd[16603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.70.27 
Feb 10 11:11:37 kmh-vmh-001-fsn05 sshd[16603]: Failed password for invalid user ygr from 117.34.70.27 port 41657 ssh2
Feb 10 11:11:38 kmh-vmh-001-fsn05 sshd[16603]: Received disconnect from 117.34.70.27 port 41657:11: Bye Bye [preauth]
Feb 10 11:11:38 kmh-vmh-001-fsn05 sshd[16603]: Disconnected from invalid user ygr 117.34.70.27 port 41657 [preauth]
Feb 10 11:30:24 kmh-vmh-001-fsn05 sshd[19897]: Invalid user qvb from 117.34.70.27 port 37131
Feb 10 11:30:24 kmh-vmh-001-fsn05 sshd[19897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.70.27 
Feb 10 11:30:25 kmh-vmh-001-fsn05 sshd[19897]: Failed password for invalid user qvb from 117.34.70.27 port ........
------------------------------
2020-02-12 08:14:48
200.16.132.202 attackbots
Feb 11 23:24:40 sd-53420 sshd\[31456\]: Invalid user kzn from 200.16.132.202
Feb 11 23:24:40 sd-53420 sshd\[31456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.202
Feb 11 23:24:42 sd-53420 sshd\[31456\]: Failed password for invalid user kzn from 200.16.132.202 port 52669 ssh2
Feb 11 23:27:43 sd-53420 sshd\[31856\]: Invalid user osz from 200.16.132.202
Feb 11 23:27:43 sd-53420 sshd\[31856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.202
...
2020-02-12 08:11:41
128.199.129.68 attackbotsspam
Feb 11 20:42:35 firewall sshd[9395]: Invalid user violeta from 128.199.129.68
Feb 11 20:42:37 firewall sshd[9395]: Failed password for invalid user violeta from 128.199.129.68 port 44934 ssh2
Feb 11 20:45:06 firewall sshd[9490]: Invalid user deploy from 128.199.129.68
...
2020-02-12 08:34:04

Recently Reported IPs

104.21.42.40 104.21.42.37 114.124.177.84 104.21.42.51
104.21.42.53 104.21.42.63 104.21.42.57 104.21.42.64
104.21.42.47 104.21.42.72 104.21.42.65 104.21.42.71
104.21.42.74 104.21.42.67 104.21.42.86 104.21.42.82
104.21.42.95 104.21.42.94 104.21.69.88 104.21.42.92