Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.8.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2514
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.8.174.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:59:44 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 174.8.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 174.8.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.88.193.230 attack
Jul  5 05:40:06 * sshd[16876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.88.193.230
Jul  5 05:40:08 * sshd[16876]: Failed password for invalid user gz from 88.88.193.230 port 40649 ssh2
2019-07-05 12:54:33
104.37.216.112 attack
2019-07-05T00:47:46.323029scmdmz1 sshd\[22419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.37.216.112  user=root
2019-07-05T00:47:48.245858scmdmz1 sshd\[22419\]: Failed password for root from 104.37.216.112 port 52758 ssh2
2019-07-05T00:47:49.401747scmdmz1 sshd\[22421\]: Invalid user DUP from 104.37.216.112 port 53350
...
2019-07-05 12:56:11
46.3.96.67 attackbots
05.07.2019 04:09:08 Connection to port 7228 blocked by firewall
2019-07-05 13:04:09
182.16.48.106 attackspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-05 00:46:03]
2019-07-05 13:13:20
193.36.239.166 attack
1,27-05/05 concatform PostRequest-Spammer scoring: wien2018
2019-07-05 13:02:45
106.12.90.234 attackspambots
Jul  5 05:35:27 ArkNodeAT sshd\[1622\]: Invalid user juanangel from 106.12.90.234
Jul  5 05:35:27 ArkNodeAT sshd\[1622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.90.234
Jul  5 05:35:29 ArkNodeAT sshd\[1622\]: Failed password for invalid user juanangel from 106.12.90.234 port 40088 ssh2
2019-07-05 12:36:56
54.38.33.186 attackbotsspam
Jul  5 02:47:55 ip-172-31-62-245 sshd\[15526\]: Failed password for ubuntu from 54.38.33.186 port 35396 ssh2\
Jul  5 02:50:04 ip-172-31-62-245 sshd\[15529\]: Invalid user invoices from 54.38.33.186\
Jul  5 02:50:07 ip-172-31-62-245 sshd\[15529\]: Failed password for invalid user invoices from 54.38.33.186 port 60796 ssh2\
Jul  5 02:52:17 ip-172-31-62-245 sshd\[15535\]: Invalid user admin from 54.38.33.186\
Jul  5 02:52:18 ip-172-31-62-245 sshd\[15535\]: Failed password for invalid user admin from 54.38.33.186 port 57962 ssh2\
2019-07-05 12:32:30
176.31.252.148 attackbotsspam
Invalid user oracle from 176.31.252.148 port 60403
2019-07-05 13:19:53
118.25.144.49 attackbots
web-1 [ssh] SSH Attack
2019-07-05 12:58:30
31.210.65.150 attackbots
2019-07-05T01:33:32.386951scmdmz1 sshd\[23278\]: Invalid user fei from 31.210.65.150 port 57203
2019-07-05T01:33:32.391267scmdmz1 sshd\[23278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.65.150
2019-07-05T01:33:34.624909scmdmz1 sshd\[23278\]: Failed password for invalid user fei from 31.210.65.150 port 57203 ssh2
...
2019-07-05 13:00:06
190.229.30.12 attack
2019-07-04 19:35:50 unexpected disconnection while reading SMTP command from host12.190-229-30.telecom.net.ar [190.229.30.12]:19726 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-07-04 19:39:33 unexpected disconnection while reading SMTP command from host12.190-229-30.telecom.net.ar [190.229.30.12]:20245 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-07-04 19:40:27 unexpected disconnection while reading SMTP command from host12.190-229-30.telecom.net.ar [190.229.30.12]:20530 I=[10.100.18.22]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.229.30.12
2019-07-05 13:15:07
51.15.55.90 attackspam
Jul  5 06:48:18 localhost sshd[31230]: Invalid user monitor from 51.15.55.90 port 40000
Jul  5 06:48:18 localhost sshd[31230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.55.90
Jul  5 06:48:18 localhost sshd[31230]: Invalid user monitor from 51.15.55.90 port 40000
Jul  5 06:48:20 localhost sshd[31230]: Failed password for invalid user monitor from 51.15.55.90 port 40000 ssh2
...
2019-07-05 12:43:16
85.96.226.158 attackbots
Jul  4 19:40:04 srv1 sshd[10485]: Did not receive identification string from 85.96.226.158
Jul  4 19:40:10 srv1 sshd[10486]: Address 85.96.226.158 maps to 85.96.226.158.dynamic.ttnet.com.tr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul  4 19:40:10 srv1 sshd[10486]: Invalid user nagesh from 85.96.226.158
Jul  4 19:40:11 srv1 sshd[10486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.96.226.158 
Jul  4 19:40:13 srv1 sshd[10486]: Failed password for invalid user nagesh from 85.96.226.158 port 60959 ssh2
Jul  4 19:40:13 srv1 sshd[10487]: Connection closed by 85.96.226.158


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=85.96.226.158
2019-07-05 13:02:24
223.181.50.52 attack
2019-07-04 19:38:51 unexpected disconnection while reading SMTP command from ([223.181.115.28]) [223.181.50.52]:56969 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-04 19:40:53 unexpected disconnection while reading SMTP command from ([223.181.115.28]) [223.181.50.52]:34643 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-04 19:41:17 unexpected disconnection while reading SMTP command from ([223.181.115.28]) [223.181.50.52]:42934 I=[10.100.18.21]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=223.181.50.52
2019-07-05 13:18:33
218.92.0.138 attackspambots
Jul  4 22:01:18 localhost sshd[3235]: Failed password for root from 218.92.0.138 port 13777 ssh2
Jul  4 22:01:21 localhost sshd[3235]: Failed password for root from 218.92.0.138 port 13777 ssh2
Jul  4 22:01:23 localhost sshd[3235]: Failed password for root from 218.92.0.138 port 13777 ssh2
Jul  4 22:01:26 localhost sshd[3235]: Failed password for root from 218.92.0.138 port 13777 ssh2
Jul  4 22:01:29 localhost sshd[3235]: Failed password for root from 218.92.0.138 port 13777 ssh2
...
2019-07-05 13:01:54

Recently Reported IPs

104.21.8.178 104.21.8.175 104.21.8.173 104.21.8.18
104.21.8.181 104.21.8.182 104.21.8.183 104.21.8.180
104.21.8.185 104.21.8.190 104.21.8.19 104.21.8.191
104.21.8.188 104.21.8.184 104.21.8.189 104.21.8.192
104.21.8.195 104.21.8.196 104.21.8.193 104.21.8.194