Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.52.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39698
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.52.155.			IN	A

;; AUTHORITY SECTION:
.			122	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:12:34 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 155.52.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 155.52.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.3.39.184 attack
Unauthorized connection attempt from IP address 122.3.39.184 on Port 445(SMB)
2019-10-16 12:29:13
112.109.20.242 attackbots
Unauthorized connection attempt from IP address 112.109.20.242 on Port 445(SMB)
2019-10-16 12:47:41
14.241.39.126 attackspambots
Unauthorized connection attempt from IP address 14.241.39.126 on Port 445(SMB)
2019-10-16 12:45:52
51.68.226.66 attack
Oct 16 06:12:55 SilenceServices sshd[26593]: Failed password for root from 51.68.226.66 port 40812 ssh2
Oct 16 06:16:48 SilenceServices sshd[27625]: Failed password for root from 51.68.226.66 port 51812 ssh2
2019-10-16 12:28:49
49.88.112.71 attackbotsspam
2019-10-16T04:33:49.112225shield sshd\[2855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-10-16T04:33:50.934979shield sshd\[2855\]: Failed password for root from 49.88.112.71 port 59430 ssh2
2019-10-16T04:33:52.934724shield sshd\[2855\]: Failed password for root from 49.88.112.71 port 59430 ssh2
2019-10-16T04:33:55.548103shield sshd\[2855\]: Failed password for root from 49.88.112.71 port 59430 ssh2
2019-10-16T04:34:23.108289shield sshd\[2949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-10-16 12:48:22
117.4.153.198 attackbots
Unauthorized connection attempt from IP address 117.4.153.198 on Port 445(SMB)
2019-10-16 12:40:43
36.72.214.192 attackbotsspam
Unauthorized connection attempt from IP address 36.72.214.192 on Port 445(SMB)
2019-10-16 12:31:24
106.13.222.115 attackbotsspam
Oct 16 05:19:07 extapp sshd[30155]: Failed password for r.r from 106.13.222.115 port 39864 ssh2
Oct 16 05:24:39 extapp sshd[32342]: Invalid user cameron from 106.13.222.115
Oct 16 05:24:41 extapp sshd[32342]: Failed password for invalid user cameron from 106.13.222.115 port 50030 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.13.222.115
2019-10-16 12:26:56
50.209.145.30 attackbotsspam
Oct 16 06:16:05 dev0-dcde-rnet sshd[11398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.145.30
Oct 16 06:16:07 dev0-dcde-rnet sshd[11398]: Failed password for invalid user cga from 50.209.145.30 port 40220 ssh2
Oct 16 06:20:26 dev0-dcde-rnet sshd[11414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.145.30
2019-10-16 12:39:42
122.96.40.124 attackbots
Unauthorized connection attempt from IP address 122.96.40.124 on Port 445(SMB)
2019-10-16 13:02:58
180.248.96.215 attackspambots
Unauthorized connection attempt from IP address 180.248.96.215 on Port 445(SMB)
2019-10-16 12:43:59
93.29.187.145 attackspambots
Oct 15 18:25:06 php1 sshd\[24429\]: Invalid user altab from 93.29.187.145
Oct 15 18:25:06 php1 sshd\[24429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.29.187.145
Oct 15 18:25:07 php1 sshd\[24429\]: Failed password for invalid user altab from 93.29.187.145 port 49812 ssh2
Oct 15 18:28:48 php1 sshd\[24730\]: Invalid user Welcome3 from 93.29.187.145
Oct 15 18:28:48 php1 sshd\[24730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.29.187.145
2019-10-16 12:29:49
149.56.100.237 attackbotsspam
Oct 15 17:43:56 tdfoods sshd\[11922\]: Invalid user wallet from 149.56.100.237
Oct 15 17:43:56 tdfoods sshd\[11922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=237.ip-149-56-100.net
Oct 15 17:43:58 tdfoods sshd\[11922\]: Failed password for invalid user wallet from 149.56.100.237 port 38420 ssh2
Oct 15 17:47:53 tdfoods sshd\[12276\]: Invalid user charity from 149.56.100.237
Oct 15 17:47:53 tdfoods sshd\[12276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=237.ip-149-56-100.net
2019-10-16 13:02:34
8.9.15.143 attack
Oct 16 06:53:38 pkdns2 sshd\[4780\]: Invalid user asteriskuser from 8.9.15.143Oct 16 06:53:40 pkdns2 sshd\[4780\]: Failed password for invalid user asteriskuser from 8.9.15.143 port 51630 ssh2Oct 16 06:57:08 pkdns2 sshd\[4978\]: Invalid user lpa from 8.9.15.143Oct 16 06:57:10 pkdns2 sshd\[4978\]: Failed password for invalid user lpa from 8.9.15.143 port 34306 ssh2Oct 16 07:01:03 pkdns2 sshd\[5155\]: Invalid user ck from 8.9.15.143Oct 16 07:01:05 pkdns2 sshd\[5155\]: Failed password for invalid user ck from 8.9.15.143 port 45212 ssh2
...
2019-10-16 12:49:24
178.150.151.168 attack
Unauthorised access (Oct 16) SRC=178.150.151.168 LEN=52 TTL=121 ID=18222 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-16 12:37:20

Recently Reported IPs

104.21.52.118 104.21.52.17 104.21.52.196 104.21.52.217
104.21.52.220 104.21.52.214 104.21.52.42 104.21.52.230
104.21.52.32 104.21.52.39 104.21.52.207 104.21.52.43
104.21.52.246 104.21.52.253 13.225.71.30 104.21.52.7
104.21.52.51 13.225.71.31 104.21.52.74 104.21.52.86