Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.43.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46587
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.43.37.			IN	A

;; AUTHORITY SECTION:
.			187	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 22:25:24 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 37.43.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 37.43.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.72.187.97 attack
Aug  2 10:41:51 ubuntu-2gb-nbg1-dc3-1 sshd[13840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.187.97
Aug  2 10:41:54 ubuntu-2gb-nbg1-dc3-1 sshd[13840]: Failed password for invalid user admin from 182.72.187.97 port 45280 ssh2
...
2019-08-02 23:47:37
123.125.71.42 attackbotsspam
Bad bot/spoofed identity
2019-08-03 00:18:45
222.161.181.147 attack
port scan and connect, tcp 23 (telnet)
2019-08-03 00:39:30
122.144.12.212 attackbotsspam
Aug  2 15:59:33 MK-Soft-VM6 sshd\[19124\]: Invalid user vivian from 122.144.12.212 port 50282
Aug  2 15:59:33 MK-Soft-VM6 sshd\[19124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.12.212
Aug  2 15:59:35 MK-Soft-VM6 sshd\[19124\]: Failed password for invalid user vivian from 122.144.12.212 port 50282 ssh2
...
2019-08-03 00:15:12
179.145.9.189 attackspambots
Automatic report - Port Scan Attack
2019-08-03 00:23:14
186.154.141.66 attackbotsspam
Automatic report - Port Scan Attack
2019-08-02 23:56:11
185.164.72.179 attackspambots
RDP Scan
2019-08-03 00:40:12
171.245.239.222 attackbotsspam
Automatic report - Port Scan Attack
2019-08-02 23:51:08
200.104.19.249 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-08-02 23:52:33
185.175.93.18 attack
Port scan on 4 port(s): 73 5473 5973 6393
2019-08-03 00:49:51
171.244.140.174 attackbots
Aug  2 17:39:33 s64-1 sshd[26838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174
Aug  2 17:39:35 s64-1 sshd[26838]: Failed password for invalid user ubuntu from 171.244.140.174 port 35387 ssh2
Aug  2 17:45:13 s64-1 sshd[26918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174
...
2019-08-02 23:54:14
5.14.199.236 attackbotsspam
Automatic report - Port Scan Attack
2019-08-03 00:03:11
107.170.201.213 attack
firewall-block, port(s): 6379/tcp
2019-08-03 00:57:54
81.22.45.72 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-03 00:40:58
138.97.66.142 attackspambots
Chat Spam
2019-08-03 00:34:04

Recently Reported IPs

104.21.43.34 104.21.43.39 104.21.43.4 104.21.43.43
104.21.43.47 104.21.43.56 104.21.43.58 104.21.43.59
104.21.43.60 104.21.43.63 104.21.43.65 241.242.52.208
104.21.43.66 104.21.43.69 104.21.43.70 161.222.50.123
104.21.43.75 104.21.43.79 104.21.43.82 104.21.43.84