Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.21.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10285
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.21.57.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 05:35:21 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 57.21.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.21.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.33.49.21 attack
$f2bV_matches
2019-10-11 07:50:13
90.150.87.199 attackspam
[munged]::443 90.150.87.199 - - [10/Oct/2019:22:04:28 +0200] "POST /[munged]: HTTP/1.1" 200 8165 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 90.150.87.199 - - [10/Oct/2019:22:04:29 +0200] "POST /[munged]: HTTP/1.1" 200 4388 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 90.150.87.199 - - [10/Oct/2019:22:04:29 +0200] "POST /[munged]: HTTP/1.1" 200 4388 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 90.150.87.199 - - [10/Oct/2019:22:04:30 +0200] "POST /[munged]: HTTP/1.1" 200 4388 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 90.150.87.199 - - [10/Oct/2019:22:04:31 +0200] "POST /[munged]: HTTP/1.1" 200 4388 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 90.150.87.199 - - [10/Oct/2019:22:04:32
2019-10-11 08:08:03
148.72.40.44 attack
[munged]::443 148.72.40.44 - - [10/Oct/2019:23:10:21 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 148.72.40.44 - - [10/Oct/2019:23:10:30 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 148.72.40.44 - - [10/Oct/2019:23:10:43 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 148.72.40.44 - - [10/Oct/2019:23:10:57 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 148.72.40.44 - - [10/Oct/2019:23:11:10 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 148.72.40.44 - - [10/Oct/2019:23:11:22 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Li
2019-10-11 07:59:55
89.82.244.102 attack
Brute forcing Wordpress login
2019-10-11 08:11:48
116.228.88.115 attack
Oct 10 23:06:51 icinga sshd[7071]: Failed password for root from 116.228.88.115 port 56576 ssh2
...
2019-10-11 07:36:40
193.188.22.188 attackbots
Oct 10 21:17:50 XXXXXX sshd[46194]: Invalid user test01 from 193.188.22.188 port 35376
2019-10-11 07:44:40
67.218.90.210 attack
10/10/2019-22:04:52.083086 67.218.90.210 Protocol: 17 GPL SNMP public access udp
2019-10-11 07:59:18
14.142.12.242 attack
Oct 10 20:04:28 unicornsoft sshd\[7412\]: User root from 14.142.12.242 not allowed because not listed in AllowUsers
Oct 10 20:04:28 unicornsoft sshd\[7412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.12.242  user=root
Oct 10 20:04:31 unicornsoft sshd\[7412\]: Failed password for invalid user root from 14.142.12.242 port 34216 ssh2
2019-10-11 08:12:03
117.121.97.94 attackbots
Oct 11 01:16:28 MK-Soft-VM4 sshd[5152]: Failed password for root from 117.121.97.94 port 40621 ssh2
...
2019-10-11 07:41:24
128.1.91.206 attack
3389BruteforceFW23
2019-10-11 07:49:07
103.102.46.176 attack
Oct 10 21:59:56 tux postfix/smtpd[19308]: connect from cloud.ionbytes.net[103.102.46.176]
Oct 10 21:59:57 tux postfix/smtpd[19308]: Anonymous TLS connection established from cloud.ionbytes.net[103.102.46.176]: TLSv1.2 whostnameh cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bhostnames)
Oct x@x
Oct 10 21:59:58 tux postfix/smtpd[19308]: disconnect from cloud.ionbytes.net[103.102.46.176]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.102.46.176
2019-10-11 07:40:19
176.62.224.58 attackbots
Oct 11 01:03:10 vps01 sshd[4564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.62.224.58
Oct 11 01:03:12 vps01 sshd[4564]: Failed password for invalid user Ranger@123 from 176.62.224.58 port 41070 ssh2
2019-10-11 07:43:23
201.47.158.130 attackbots
Oct 11 00:53:51 cvbnet sshd[29523]: Failed password for root from 201.47.158.130 port 35866 ssh2
...
2019-10-11 07:42:39
118.25.55.87 attackspambots
SSH invalid-user multiple login try
2019-10-11 08:00:43
46.38.144.17 attack
Oct 11 01:42:32 webserver postfix/smtpd\[8547\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 01:43:56 webserver postfix/smtpd\[7871\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 01:45:19 webserver postfix/smtpd\[7871\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 01:46:42 webserver postfix/smtpd\[7871\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 01:48:05 webserver postfix/smtpd\[8547\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-11 07:53:25

Recently Reported IPs

104.18.21.28 104.18.21.81 104.18.210.79 104.18.214.12
104.18.215.12 104.18.219.223 104.18.22.100 104.18.22.117
104.18.22.120 104.18.22.144 77.36.62.199 104.18.22.187
104.18.22.196 104.18.22.203 104.18.22.215 104.18.22.241
104.18.22.244 104.18.22.44 104.18.22.5 104.18.22.52