Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.8.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.8.225.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:00:02 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 225.8.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 225.8.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.255.171.51 attack
SSH Bruteforce attack
2019-11-07 01:13:30
149.56.44.101 attack
Nov  6 06:47:57 eddieflores sshd\[11942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net  user=root
Nov  6 06:47:59 eddieflores sshd\[11942\]: Failed password for root from 149.56.44.101 port 50234 ssh2
Nov  6 06:51:41 eddieflores sshd\[12229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net  user=root
Nov  6 06:51:43 eddieflores sshd\[12229\]: Failed password for root from 149.56.44.101 port 59780 ssh2
Nov  6 06:55:22 eddieflores sshd\[12582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net  user=root
2019-11-07 01:09:12
187.103.82.78 attackbots
Automatic report - Port Scan Attack
2019-11-07 01:24:25
140.143.16.248 attackbots
Nov  6 09:38:55 lanister sshd[19287]: Invalid user pathy from 140.143.16.248
Nov  6 09:38:55 lanister sshd[19287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.16.248
Nov  6 09:38:55 lanister sshd[19287]: Invalid user pathy from 140.143.16.248
Nov  6 09:38:57 lanister sshd[19287]: Failed password for invalid user pathy from 140.143.16.248 port 51678 ssh2
...
2019-11-07 01:28:22
106.12.190.104 attackspambots
Nov  6 06:51:59 hanapaa sshd\[1779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.190.104  user=root
Nov  6 06:52:01 hanapaa sshd\[1779\]: Failed password for root from 106.12.190.104 port 59140 ssh2
Nov  6 06:56:21 hanapaa sshd\[2086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.190.104  user=root
Nov  6 06:56:23 hanapaa sshd\[2086\]: Failed password for root from 106.12.190.104 port 38392 ssh2
Nov  6 07:00:44 hanapaa sshd\[2416\]: Invalid user shaun from 106.12.190.104
2019-11-07 01:18:14
159.203.193.0 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-07 00:54:10
125.64.94.212 attackspambots
Connection by 125.64.94.212 on port: 13013 got caught by honeypot at 11/6/2019 3:16:57 PM
2019-11-07 01:18:32
51.83.69.200 attackbotsspam
2019-11-06T15:11:23.982638abusebot-3.cloudsearch.cf sshd\[1524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-51-83-69.eu  user=root
2019-11-07 00:47:41
152.32.185.122 attackspam
Nov  6 15:31:51 srv01 sshd[3065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.185.122  user=root
Nov  6 15:31:53 srv01 sshd[3065]: Failed password for root from 152.32.185.122 port 40232 ssh2
Nov  6 15:35:56 srv01 sshd[3290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.185.122  user=root
Nov  6 15:35:58 srv01 sshd[3290]: Failed password for root from 152.32.185.122 port 50880 ssh2
Nov  6 15:39:54 srv01 sshd[3449]: Invalid user support from 152.32.185.122
...
2019-11-07 00:48:29
122.51.49.91 attack
Nov  6 06:40:30 web1 sshd\[23620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.49.91  user=root
Nov  6 06:40:32 web1 sshd\[23620\]: Failed password for root from 122.51.49.91 port 47742 ssh2
Nov  6 06:44:31 web1 sshd\[23963\]: Invalid user plesk from 122.51.49.91
Nov  6 06:44:31 web1 sshd\[23963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.49.91
Nov  6 06:44:33 web1 sshd\[23963\]: Failed password for invalid user plesk from 122.51.49.91 port 50088 ssh2
2019-11-07 00:51:46
81.171.107.179 attackbotsspam
\[2019-11-06 11:40:26\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.107.179:59539' - Wrong password
\[2019-11-06 11:40:26\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-06T11:40:26.167-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="18045",SessionID="0x7fdf2cbce618",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.107.179/59539",Challenge="750e9e05",ReceivedChallenge="750e9e05",ReceivedHash="82e333248baad78bb26c33a29356e744"
\[2019-11-06 11:41:41\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.107.179:58845' - Wrong password
\[2019-11-06 11:41:41\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-06T11:41:41.917-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="40972",SessionID="0x7fdf2cbce618",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81
2019-11-07 01:00:22
115.159.101.174 attack
Nov  6 18:26:01 sd-53420 sshd\[956\]: Invalid user colin from 115.159.101.174
Nov  6 18:26:01 sd-53420 sshd\[956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.101.174
Nov  6 18:26:02 sd-53420 sshd\[956\]: Failed password for invalid user colin from 115.159.101.174 port 40680 ssh2
Nov  6 18:31:46 sd-53420 sshd\[1563\]: Invalid user admin from 115.159.101.174
Nov  6 18:31:46 sd-53420 sshd\[1563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.101.174
...
2019-11-07 01:33:08
142.93.215.102 attack
2019-11-06T15:13:26.049286abusebot-5.cloudsearch.cf sshd\[8734\]: Invalid user yjlo from 142.93.215.102 port 47274
2019-11-07 01:27:02
222.92.244.42 attackspam
port scan and connect, tcp 22 (ssh)
2019-11-07 01:16:20
86.102.131.30 attackspam
11/06/2019-09:39:52.810516 86.102.131.30 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-07 00:49:16

Recently Reported IPs

104.21.8.229 104.21.8.232 104.21.8.227 104.21.8.23
104.21.8.231 104.21.8.236 104.21.8.233 104.21.8.235
104.21.8.239 104.21.8.238 104.21.8.24 104.21.8.241
104.21.8.242 104.21.8.245 104.21.8.244 104.21.8.246
104.21.8.247 104.21.8.249 104.21.8.250 104.21.8.248