Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.121.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.121.39.			IN	A

;; AUTHORITY SECTION:
.			444	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 11:36:33 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 39.121.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.121.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.136.167.86 attackspambots
firewall-block, port(s): 1433/tcp
2020-01-01 05:14:34
104.236.176.175 attack
$f2bV_matches
2020-01-01 05:13:23
178.62.75.60 attackbots
Dec 31 22:11:28 lnxmysql61 sshd[26955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60
Dec 31 22:11:31 lnxmysql61 sshd[26955]: Failed password for invalid user diane from 178.62.75.60 port 56136 ssh2
Dec 31 22:14:20 lnxmysql61 sshd[27057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60
2020-01-01 05:26:02
122.152.208.242 attackbots
Automatic report - Banned IP Access
2020-01-01 05:09:00
68.183.124.53 attackbotsspam
$f2bV_matches
2020-01-01 05:30:23
202.131.126.142 attackspambots
Dec 31 14:49:18 prox sshd[26031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.126.142 
Dec 31 14:49:20 prox sshd[26031]: Failed password for invalid user mysql from 202.131.126.142 port 45052 ssh2
2020-01-01 05:08:31
116.86.166.93 attackspambots
Dec 31 17:28:29 lnxmysql61 sshd[22511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.86.166.93
Dec 31 17:28:30 lnxmysql61 sshd[22512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.86.166.93
Dec 31 17:28:32 lnxmysql61 sshd[22511]: Failed password for invalid user pi from 116.86.166.93 port 42344 ssh2
2020-01-01 05:13:35
51.255.199.33 attack
Dec 31 21:50:11 ns381471 sshd[13547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.199.33
Dec 31 21:50:13 ns381471 sshd[13547]: Failed password for invalid user french from 51.255.199.33 port 59080 ssh2
2020-01-01 05:41:02
112.21.188.251 attack
$f2bV_matches
2020-01-01 05:16:35
49.68.182.8 attack
Fail2Ban Ban Triggered
2020-01-01 05:30:37
49.81.93.89 attackspambots
Dec 31 15:48:11 grey postfix/smtpd\[29490\]: NOQUEUE: reject: RCPT from unknown\[49.81.93.89\]: 554 5.7.1 Service unavailable\; Client host \[49.81.93.89\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=49.81.93.89\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-01 05:48:10
109.173.85.245 attackspambots
Illegal actions on webapp
2020-01-01 05:11:56
58.48.84.228 attack
Honeypot attack, port: 23, PTR: PTR record not found
2020-01-01 05:25:37
51.68.82.218 attackbots
SSH login attempts.
2020-01-01 05:05:54
130.176.89.86 attack
Automatic report generated by Wazuh
2020-01-01 05:14:55

Recently Reported IPs

104.18.12.23 104.18.120.39 104.18.10.12 104.18.12.73
104.18.127.236 104.18.126.236 104.18.13.137 104.18.13.111
104.18.13.23 104.18.13.158 104.18.13.100 104.18.13.229
104.18.13.17 104.18.13.33 104.18.13.73 104.18.131.101
104.18.130.101 104.18.13.230 104.18.134.85 104.18.133.85