Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.74.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.74.227.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:53:18 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 227.74.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 227.74.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.67.105.220 attackspam
Jun  8 08:46:36 marvibiene sshd[7948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.105.220  user=root
Jun  8 08:46:38 marvibiene sshd[7948]: Failed password for root from 114.67.105.220 port 52874 ssh2
Jun  8 08:58:49 marvibiene sshd[8051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.105.220  user=root
Jun  8 08:58:51 marvibiene sshd[8051]: Failed password for root from 114.67.105.220 port 45790 ssh2
...
2020-06-08 17:51:23
154.117.154.86 attack
20 attempts against mh-ssh on echoip
2020-06-08 17:57:25
106.54.245.12 attack
Jun  8 06:41:57 gestao sshd[8556]: Failed password for root from 106.54.245.12 port 51612 ssh2
Jun  8 06:46:28 gestao sshd[8608]: Failed password for root from 106.54.245.12 port 46620 ssh2
...
2020-06-08 17:44:33
71.6.158.166 attack
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 2121
2020-06-08 17:56:15
162.243.144.109 attack
Unauthorized connection attempt detected from IP address 162.243.144.109 to port 2638 [T]
2020-06-08 17:44:00
113.142.58.155 attack
Jun  8 00:51:02 pixelmemory sshd[628814]: Failed password for root from 113.142.58.155 port 54550 ssh2
Jun  8 00:55:12 pixelmemory sshd[633299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.142.58.155  user=root
Jun  8 00:55:14 pixelmemory sshd[633299]: Failed password for root from 113.142.58.155 port 53074 ssh2
Jun  8 00:59:14 pixelmemory sshd[637738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.142.58.155  user=root
Jun  8 00:59:16 pixelmemory sshd[637738]: Failed password for root from 113.142.58.155 port 51598 ssh2
...
2020-06-08 18:05:37
198.27.80.123 attackbotsspam
198.27.80.123 - - [08/Jun/2020:11:49:41 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [08/Jun/2020:11:49:41 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [08/Jun/2020:11:49:42 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [08/Jun/2020:11:49:42 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.80.123 - - [08/Jun/2020:11:49:43 +0200] "POST /wp-login.php HTTP/1.1" 200 5369 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safar
...
2020-06-08 18:06:26
115.127.71.29 attackspam
Jun  8 05:42:20 legacy sshd[13154]: Failed password for root from 115.127.71.29 port 51662 ssh2
Jun  8 05:45:33 legacy sshd[13237]: Failed password for root from 115.127.71.29 port 33868 ssh2
...
2020-06-08 18:15:50
177.125.164.225 attack
2020-06-08T05:01:04.001875shield sshd\[1224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.125.164.225  user=root
2020-06-08T05:01:05.929930shield sshd\[1224\]: Failed password for root from 177.125.164.225 port 41692 ssh2
2020-06-08T05:05:16.875292shield sshd\[1621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.125.164.225  user=root
2020-06-08T05:05:18.868663shield sshd\[1621\]: Failed password for root from 177.125.164.225 port 44640 ssh2
2020-06-08T05:09:26.714216shield sshd\[1991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.125.164.225  user=root
2020-06-08 17:52:26
222.186.175.202 attack
$f2bV_matches
2020-06-08 18:20:04
182.61.180.183 attackspam
Jun  8 14:13:33 gw1 sshd[4873]: Failed password for root from 182.61.180.183 port 33412 ssh2
...
2020-06-08 17:50:30
37.187.108.159 attack
2020-06-08T05:54:01.817422shield sshd\[12997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns326852.ip-37-187-108.eu  user=root
2020-06-08T05:54:03.696849shield sshd\[12997\]: Failed password for root from 37.187.108.159 port 34562 ssh2
2020-06-08T05:55:07.927372shield sshd\[13607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns326852.ip-37-187-108.eu  user=root
2020-06-08T05:55:10.202807shield sshd\[13607\]: Failed password for root from 37.187.108.159 port 54616 ssh2
2020-06-08T05:56:11.274482shield sshd\[14008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns326852.ip-37-187-108.eu  user=root
2020-06-08 17:49:55
104.248.122.148 attackbots
Jun  8 12:42:46 hosting sshd[558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.122.148  user=root
Jun  8 12:42:48 hosting sshd[558]: Failed password for root from 104.248.122.148 port 41048 ssh2
...
2020-06-08 18:09:48
165.22.63.27 attack
Jun  8 05:51:40 onepixel sshd[3955935]: Failed password for root from 165.22.63.27 port 43768 ssh2
Jun  8 05:53:25 onepixel sshd[3956144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.27  user=root
Jun  8 05:53:26 onepixel sshd[3956144]: Failed password for root from 165.22.63.27 port 42162 ssh2
Jun  8 05:55:15 onepixel sshd[3956367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.27  user=root
Jun  8 05:55:17 onepixel sshd[3956367]: Failed password for root from 165.22.63.27 port 40558 ssh2
2020-06-08 17:56:03
185.24.233.37 attackspambots
Jun  8 10:44:51 mail postfix/smtpd\[6267\]: warning: unknown\[185.24.233.37\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun  8 10:46:14 mail postfix/smtpd\[6267\]: warning: unknown\[185.24.233.37\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun  8 10:58:07 mail postfix/smtpd\[6692\]: warning: unknown\[185.24.233.37\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun  8 11:38:06 mail postfix/smtpd\[7857\]: warning: unknown\[185.24.233.37\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-06-08 17:47:53

Recently Reported IPs

104.21.74.225 104.21.74.226 104.21.74.229 104.21.74.23
104.21.74.233 104.21.74.231 104.21.74.235 104.21.74.236
104.21.74.238 104.21.74.230 104.21.74.239 104.21.74.24
104.21.74.241 104.21.74.242 104.21.74.247 104.21.74.243
104.21.74.245 104.21.74.254 104.21.74.250 104.21.74.248