Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.55.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49787
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.55.100.			IN	A

;; AUTHORITY SECTION:
.			152	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 11:41:25 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 100.55.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.55.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.195.174.228 attackbotsspam
leo_www
2020-05-24 00:53:09
159.89.194.103 attack
Failed password for invalid user tn from 159.89.194.103 port 51104 ssh2
2020-05-24 00:40:23
58.249.123.38 attackspam
Invalid user geb from 58.249.123.38 port 55582
2020-05-24 01:08:22
189.203.72.138 attack
fail2ban -- 189.203.72.138
...
2020-05-24 00:54:12
64.225.67.233 attackbotsspam
May 23 18:17:18 vps687878 sshd\[11689\]: Failed password for invalid user dzk from 64.225.67.233 port 59556 ssh2
May 23 18:20:39 vps687878 sshd\[12121\]: Invalid user ame from 64.225.67.233 port 36356
May 23 18:20:39 vps687878 sshd\[12121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.67.233
May 23 18:20:40 vps687878 sshd\[12121\]: Failed password for invalid user ame from 64.225.67.233 port 36356 ssh2
May 23 18:24:09 vps687878 sshd\[12373\]: Invalid user kxw from 64.225.67.233 port 41394
May 23 18:24:09 vps687878 sshd\[12373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.67.233
...
2020-05-24 00:46:52
180.218.95.171 attack
Invalid user admin from 180.218.95.171 port 56624
2020-05-24 00:55:15
77.40.123.115 attackbotsspam
Invalid user kyw from 77.40.123.115 port 58862
2020-05-24 00:46:19
91.144.173.197 attackspam
Bruteforce detected by fail2ban
2020-05-24 00:46:04
159.65.216.161 attackbots
May 23 16:37:34 ns382633 sshd\[29027\]: Invalid user foy from 159.65.216.161 port 52470
May 23 16:37:34 ns382633 sshd\[29027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.216.161
May 23 16:37:36 ns382633 sshd\[29027\]: Failed password for invalid user foy from 159.65.216.161 port 52470 ssh2
May 23 16:42:27 ns382633 sshd\[29972\]: Invalid user nqb from 159.65.216.161 port 59584
May 23 16:42:27 ns382633 sshd\[29972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.216.161
2020-05-24 00:58:17
110.43.49.47 attack
Invalid user lijiabin from 110.43.49.47 port 45746
2020-05-24 00:44:50
217.153.229.226 attack
$f2bV_matches
2020-05-24 00:33:52
87.117.178.105 attackbotsspam
Invalid user postgre from 87.117.178.105 port 49092
2020-05-24 01:05:58
159.65.41.159 attackspambots
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2020-05-24 00:58:44
60.174.248.244 attackspambots
Invalid user fhb from 60.174.248.244 port 46176
2020-05-24 01:08:03
174.138.64.177 attack
Invalid user hvf from 174.138.64.177 port 53062
2020-05-24 00:39:08

Recently Reported IPs

104.21.51.212 104.21.55.123 104.21.55.130 104.21.54.159
104.21.55.89 104.21.56.2 104.21.53.31 104.21.56.233
104.21.59.161 104.21.58.190 104.21.59.192 104.21.56.131
104.21.58.94 104.21.58.32 104.21.60.244 104.21.60.87
104.21.60.76 104.21.60.40 104.21.60.92 104.21.60.72