Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.21.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15190
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.21.215.			IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:23:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 215.21.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.21.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
70.37.75.157 attack
Invalid user zhangxd from 70.37.75.157 port 41886
2020-07-18 21:31:08
150.95.177.195 attackspam
Jul 18 07:00:50 Host-KLAX-C sshd[25843]: Invalid user eggdrop from 150.95.177.195 port 33794
...
2020-07-18 21:55:24
125.24.11.127 attackbotsspam
Invalid user support from 125.24.11.127 port 12415
2020-07-18 21:58:03
114.199.123.211 attackbots
Invalid user felix from 114.199.123.211 port 59661
2020-07-18 22:01:22
117.139.166.27 attack
Invalid user anna from 117.139.166.27 port 10573
2020-07-18 22:00:58
200.69.236.172 attackbotsspam
Jul 18 13:35:49 ip-172-31-61-156 sshd[16844]: Invalid user cq from 200.69.236.172
Jul 18 13:35:49 ip-172-31-61-156 sshd[16844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.172
Jul 18 13:35:49 ip-172-31-61-156 sshd[16844]: Invalid user cq from 200.69.236.172
Jul 18 13:35:52 ip-172-31-61-156 sshd[16844]: Failed password for invalid user cq from 200.69.236.172 port 57840 ssh2
Jul 18 13:37:41 ip-172-31-61-156 sshd[16992]: Invalid user kroener from 200.69.236.172
...
2020-07-18 21:47:15
190.24.6.162 attack
Invalid user xwz from 190.24.6.162 port 43978
2020-07-18 21:48:23
185.220.102.4 attackspambots
SSH Brute-Force attacks
2020-07-18 21:50:38
106.13.52.107 attackbotsspam
Invalid user dva from 106.13.52.107 port 60112
2020-07-18 21:22:04
51.68.122.155 attack
2020-07-18T15:03:53.450947vps773228.ovh.net sshd[8966]: Invalid user santhosh from 51.68.122.155 port 41162
2020-07-18T15:03:53.470409vps773228.ovh.net sshd[8966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.ip-51-68-122.eu
2020-07-18T15:03:53.450947vps773228.ovh.net sshd[8966]: Invalid user santhosh from 51.68.122.155 port 41162
2020-07-18T15:03:55.428576vps773228.ovh.net sshd[8966]: Failed password for invalid user santhosh from 51.68.122.155 port 41162 ssh2
2020-07-18T15:07:52.157038vps773228.ovh.net sshd[9010]: Invalid user san from 51.68.122.155 port 51378
...
2020-07-18 21:35:50
49.234.216.52 attack
Invalid user test4 from 49.234.216.52 port 60530
2020-07-18 21:36:55
213.32.70.208 attack
Invalid user samba from 213.32.70.208 port 36780
2020-07-18 21:42:53
122.51.209.252 attackbotsspam
SSH Brute-Force. Ports scanning.
2020-07-18 21:59:33
106.12.198.232 attack
Invalid user acr from 106.12.198.232 port 49924
2020-07-18 21:22:38
73.11.38.246 attack
Invalid user admin from 73.11.38.246 port 56864
2020-07-18 21:30:25

Recently Reported IPs

104.22.20.81 104.22.20.215 104.22.22.114 104.22.22.147
13.226.31.10 104.22.21.81 104.22.22.150 104.22.23.147
104.22.23.114 104.22.22.64 104.22.22.154 104.22.22.170
104.22.22.192 104.22.22.239 104.22.22.203 104.22.23.154
104.22.23.192 104.22.23.239 104.22.23.150 104.22.23.203