Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.55.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14095
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.55.106.			IN	A

;; AUTHORITY SECTION:
.			276	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 00:10:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 106.55.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.55.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.85.228.178 attack
Hacking steam account from ip
2019-09-26 19:10:22
93.65.245.3 attack
Automatic report - Port Scan Attack
2019-09-26 18:33:40
200.145.23.2 attackspam
" "
2019-09-26 18:41:20
106.122.175.147 attackbots
Sep 25 22:53:00 cumulus sshd[15579]: Invalid user acct from 106.122.175.147 port 51032
Sep 25 22:53:00 cumulus sshd[15579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.122.175.147
Sep 25 22:53:02 cumulus sshd[15579]: Failed password for invalid user acct from 106.122.175.147 port 51032 ssh2
Sep 25 22:53:03 cumulus sshd[15579]: Received disconnect from 106.122.175.147 port 51032:11: Bye Bye [preauth]
Sep 25 22:53:03 cumulus sshd[15579]: Disconnected from 106.122.175.147 port 51032 [preauth]
Sep 25 23:21:34 cumulus sshd[16345]: Invalid user acct from 106.122.175.147 port 58564
Sep 25 23:21:34 cumulus sshd[16345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.122.175.147
Sep 25 23:21:35 cumulus sshd[16345]: Failed password for invalid user acct from 106.122.175.147 port 58564 ssh2
Sep 25 23:21:36 cumulus sshd[16345]: Received disconnect from 106.122.175.147 port 58564:11: Bye Bye ........
-------------------------------
2019-09-26 18:38:52
119.49.156.61 attack
Unauthorised access (Sep 26) SRC=119.49.156.61 LEN=40 TTL=49 ID=46571 TCP DPT=8080 WINDOW=14691 SYN
2019-09-26 18:42:54
151.36.85.141 attackbotsspam
Sep 26 05:42:00 eventyay sshd[320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.36.85.141
Sep 26 05:42:00 eventyay sshd[322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.36.85.141
Sep 26 05:42:02 eventyay sshd[320]: Failed password for invalid user pi from 151.36.85.141 port 40365 ssh2
Sep 26 05:42:02 eventyay sshd[322]: Failed password for invalid user pi from 151.36.85.141 port 40368 ssh2
...
2019-09-26 19:04:21
119.145.165.122 attack
Sep 25 22:01:06 php1 sshd\[20420\]: Invalid user wildfly from 119.145.165.122
Sep 25 22:01:06 php1 sshd\[20420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.145.165.122
Sep 25 22:01:09 php1 sshd\[20420\]: Failed password for invalid user wildfly from 119.145.165.122 port 43230 ssh2
Sep 25 22:03:43 php1 sshd\[20626\]: Invalid user teamspeak from 119.145.165.122
Sep 25 22:03:43 php1 sshd\[20626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.145.165.122
2019-09-26 19:01:40
223.223.183.243 attackbotsspam
$f2bV_matches
2019-09-26 18:25:45
51.83.46.16 attackspambots
Sep 26 10:21:01 MainVPS sshd[2877]: Invalid user nardin from 51.83.46.16 port 42550
Sep 26 10:21:01 MainVPS sshd[2877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.46.16
Sep 26 10:21:01 MainVPS sshd[2877]: Invalid user nardin from 51.83.46.16 port 42550
Sep 26 10:21:03 MainVPS sshd[2877]: Failed password for invalid user nardin from 51.83.46.16 port 42550 ssh2
Sep 26 10:24:47 MainVPS sshd[3123]: Invalid user nadine from 51.83.46.16 port 55938
...
2019-09-26 18:38:10
149.202.210.31 attackbots
Sep 26 08:27:29 SilenceServices sshd[10253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.210.31
Sep 26 08:27:30 SilenceServices sshd[10253]: Failed password for invalid user db2inst2 from 149.202.210.31 port 60064 ssh2
Sep 26 08:31:52 SilenceServices sshd[11390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.210.31
2019-09-26 18:30:58
106.248.41.245 attackspam
Sep 26 07:03:11 www2 sshd\[22250\]: Invalid user verwalter from 106.248.41.245Sep 26 07:03:13 www2 sshd\[22250\]: Failed password for invalid user verwalter from 106.248.41.245 port 34230 ssh2Sep 26 07:08:19 www2 sshd\[22808\]: Invalid user kym from 106.248.41.245
...
2019-09-26 19:09:32
210.212.194.113 attack
Sep 26 09:56:41 MK-Soft-VM4 sshd[30200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.194.113 
Sep 26 09:56:43 MK-Soft-VM4 sshd[30200]: Failed password for invalid user contec from 210.212.194.113 port 41222 ssh2
...
2019-09-26 18:30:40
220.94.205.218 attackbots
Invalid user gerente from 220.94.205.218 port 57370
2019-09-26 18:17:55
195.154.27.239 attack
Invalid user lulu from 195.154.27.239 port 36869
2019-09-26 18:56:46
197.32.85.22 attackbots
port scan and connect, tcp 23 (telnet)
2019-09-26 18:51:10

Recently Reported IPs

104.21.55.102 104.21.55.107 104.21.55.108 104.21.55.11
104.21.55.110 141.30.181.100 104.21.55.113 104.21.55.115
104.21.55.117 104.21.55.118 104.21.55.120 104.21.55.122
104.21.55.124 104.21.55.13 104.21.55.131 104.21.55.132
104.21.55.134 104.21.55.136 104.21.55.137 101.60.123.122