Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.68.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.68.137.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:46:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 137.68.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.68.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.75.111 attack
invalid login attempt (ark)
2020-08-25 17:07:15
61.177.172.177 attack
2020-08-25T09:02:41.452632dmca.cloudsearch.cf sshd[16125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
2020-08-25T09:02:43.491118dmca.cloudsearch.cf sshd[16125]: Failed password for root from 61.177.172.177 port 7608 ssh2
2020-08-25T09:02:46.519800dmca.cloudsearch.cf sshd[16125]: Failed password for root from 61.177.172.177 port 7608 ssh2
2020-08-25T09:02:41.452632dmca.cloudsearch.cf sshd[16125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
2020-08-25T09:02:43.491118dmca.cloudsearch.cf sshd[16125]: Failed password for root from 61.177.172.177 port 7608 ssh2
2020-08-25T09:02:46.519800dmca.cloudsearch.cf sshd[16125]: Failed password for root from 61.177.172.177 port 7608 ssh2
2020-08-25T09:02:41.452632dmca.cloudsearch.cf sshd[16125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
2020-
...
2020-08-25 17:25:02
184.105.139.97 attackbotsspam
Port scanning [2 denied]
2020-08-25 17:14:48
94.102.56.216 attackspambots
94.102.56.216 was recorded 5 times by 4 hosts attempting to connect to the following ports: 56243,57057. Incident counter (4h, 24h, all-time): 5, 33, 1815
2020-08-25 17:09:16
104.27.156.6 attackbotsspam
Sending out spam emails from IP 
 2001:41d0:1004:20d9:0:0:0:0 (ovh. net) 

Advertising that they are selling hacked dating account
 as well as compromised SMTP servers, shells, cpanel
accounts and other illegal activity. 

For OVH report via their form as well as email
https://www.ovh.com/world/abuse/

And send the complaint to
abuse@ovh.net
noc@ovh.net

OVH.NET are pure scumbags and allow their customers to spam
and ignore abuse complaints these guys are the worst of the worst! 
Pure scumbags! 


Now the spammer's websites are located at
http://toolsbase.ws
IP:   104.27.156.6, 104.27.157.6, 172.67.222.105 (cloudflare.com)

For Cloudflare report via their form at 
https://www.cloudflare.com/abuse/
and noc@cloudflare.com and abuse@cloudflare.com
2020-08-25 17:09:42
222.186.31.166 attackspambots
Unauthorized connection attempt detected from IP address 222.186.31.166 to port 22 [T]
2020-08-25 17:37:20
140.143.244.31 attackbots
$f2bV_matches
2020-08-25 17:20:09
123.176.28.228 attack
Invalid user jquery from 123.176.28.228 port 22895
2020-08-25 17:32:56
173.212.251.144 attackspambots
Aug 25 07:22:25 ws26vmsma01 sshd[134987]: Failed password for root from 173.212.251.144 port 46072 ssh2
Aug 25 07:26:05 ws26vmsma01 sshd[137034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.251.144
...
2020-08-25 17:16:02
219.150.93.157 attack
Aug 25 07:02:07 vps sshd[20355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.150.93.157 
Aug 25 07:02:09 vps sshd[20355]: Failed password for invalid user resto from 219.150.93.157 port 52902 ssh2
Aug 25 07:07:25 vps sshd[20755]: Failed password for root from 219.150.93.157 port 54018 ssh2
...
2020-08-25 17:03:39
185.38.175.71 attackspambots
2020-08-25T03:52:23.545115abusebot.cloudsearch.cf sshd[5323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.38.175.71  user=root
2020-08-25T03:52:25.320384abusebot.cloudsearch.cf sshd[5323]: Failed password for root from 185.38.175.71 port 48210 ssh2
2020-08-25T03:52:27.538686abusebot.cloudsearch.cf sshd[5323]: Failed password for root from 185.38.175.71 port 48210 ssh2
2020-08-25T03:52:23.545115abusebot.cloudsearch.cf sshd[5323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.38.175.71  user=root
2020-08-25T03:52:25.320384abusebot.cloudsearch.cf sshd[5323]: Failed password for root from 185.38.175.71 port 48210 ssh2
2020-08-25T03:52:27.538686abusebot.cloudsearch.cf sshd[5323]: Failed password for root from 185.38.175.71 port 48210 ssh2
2020-08-25T03:52:23.545115abusebot.cloudsearch.cf sshd[5323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.38.175.7
...
2020-08-25 17:15:10
206.189.190.27 attackspambots
>20 unauthorized SSH connections
2020-08-25 17:28:04
34.94.222.56 attack
Aug 25 08:23:19 v22019038103785759 sshd\[29646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.94.222.56  user=root
Aug 25 08:23:21 v22019038103785759 sshd\[29646\]: Failed password for root from 34.94.222.56 port 40622 ssh2
Aug 25 08:27:49 v22019038103785759 sshd\[31161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.94.222.56  user=root
Aug 25 08:27:51 v22019038103785759 sshd\[31161\]: Failed password for root from 34.94.222.56 port 35430 ssh2
Aug 25 08:30:48 v22019038103785759 sshd\[32040\]: Invalid user alfredo from 34.94.222.56 port 46952
Aug 25 08:30:48 v22019038103785759 sshd\[32040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.94.222.56
...
2020-08-25 17:24:07
113.161.35.243 attack
Unauthorized IMAP connection attempt
2020-08-25 17:19:12
94.200.247.166 attack
SSH Login Bruteforce
2020-08-25 17:16:30

Recently Reported IPs

104.21.68.134 104.21.68.135 104.21.68.14 104.21.68.141
104.21.68.142 104.21.70.84 104.21.68.148 104.21.68.154
104.21.68.145 104.21.68.161 104.21.68.164 104.21.68.17
104.21.70.86 104.21.68.16 104.21.68.159 104.21.68.168
104.21.68.173 104.21.68.172 104.21.68.171 104.21.68.179