Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.21.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.21.6.			IN	A

;; AUTHORITY SECTION:
.			536	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 14:38:55 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 6.21.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.21.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.137.20.58 attack
Sep 22 23:01:48 web1 sshd\[29086\]: Invalid user test from 202.137.20.58
Sep 22 23:01:48 web1 sshd\[29086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.20.58
Sep 22 23:01:50 web1 sshd\[29086\]: Failed password for invalid user test from 202.137.20.58 port 24573 ssh2
Sep 22 23:06:09 web1 sshd\[29525\]: Invalid user can from 202.137.20.58
Sep 22 23:06:09 web1 sshd\[29525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.20.58
2019-09-23 17:20:43
181.55.94.162 attackspam
$f2bV_matches
2019-09-23 16:54:10
103.92.25.199 attackbots
Sep 23 08:51:22 vps647732 sshd[31676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.25.199
Sep 23 08:51:24 vps647732 sshd[31676]: Failed password for invalid user arobert from 103.92.25.199 port 32946 ssh2
...
2019-09-23 16:53:07
49.88.112.110 attack
Sep 23 05:47:41 *** sshd[21135]: User root from 49.88.112.110 not allowed because not listed in AllowUsers
2019-09-23 17:15:57
183.109.79.252 attack
Sep 23 07:07:07 vps01 sshd[21309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.79.252
Sep 23 07:07:09 vps01 sshd[21309]: Failed password for invalid user sentry from 183.109.79.252 port 33757 ssh2
2019-09-23 17:04:20
178.33.12.237 attack
Sep 23 09:55:46 bouncer sshd\[15991\]: Invalid user agsadmin from 178.33.12.237 port 55082
Sep 23 09:55:46 bouncer sshd\[15991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.12.237 
Sep 23 09:55:48 bouncer sshd\[15991\]: Failed password for invalid user agsadmin from 178.33.12.237 port 55082 ssh2
...
2019-09-23 16:46:08
106.12.83.135 attackspam
k+ssh-bruteforce
2019-09-23 16:52:49
54.36.180.236 attack
2019-09-23T05:57:32.273857hub.schaetter.us sshd\[19028\]: Invalid user marinho from 54.36.180.236
2019-09-23T05:57:32.306669hub.schaetter.us sshd\[19028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=236.ip-54-36-180.eu
2019-09-23T05:57:34.449455hub.schaetter.us sshd\[19028\]: Failed password for invalid user marinho from 54.36.180.236 port 51036 ssh2
2019-09-23T06:01:07.207294hub.schaetter.us sshd\[19074\]: Invalid user rowenta from 54.36.180.236
2019-09-23T06:01:07.245600hub.schaetter.us sshd\[19074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=236.ip-54-36-180.eu
...
2019-09-23 17:10:45
119.130.107.16 attack
SSH-bruteforce attempts
2019-09-23 17:03:53
203.176.131.246 attack
Sep 23 09:39:50 dev0-dcde-rnet sshd[29890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.176.131.246
Sep 23 09:39:52 dev0-dcde-rnet sshd[29890]: Failed password for invalid user Administrator from 203.176.131.246 port 45662 ssh2
Sep 23 09:48:42 dev0-dcde-rnet sshd[29920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.176.131.246
2019-09-23 16:50:07
222.75.117.90 attack
Sep 23 12:20:09 taivassalofi sshd[76517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.75.117.90
Sep 23 12:20:11 taivassalofi sshd[76517]: Failed password for invalid user ts1 from 222.75.117.90 port 55366 ssh2
...
2019-09-23 17:22:49
114.143.139.38 attack
Sep 23 10:51:42 ns37 sshd[11495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.139.38
Sep 23 10:51:42 ns37 sshd[11495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.139.38
2019-09-23 17:14:34
62.7.90.34 attackspam
Sep 23 03:55:07 aat-srv002 sshd[5538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.7.90.34
Sep 23 03:55:09 aat-srv002 sshd[5538]: Failed password for invalid user www from 62.7.90.34 port 57374 ssh2
Sep 23 03:58:46 aat-srv002 sshd[5654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.7.90.34
Sep 23 03:58:48 aat-srv002 sshd[5654]: Failed password for invalid user anjitha from 62.7.90.34 port 49312 ssh2
...
2019-09-23 17:19:53
103.250.199.101 spam
send virus
2019-09-23 16:57:56
46.231.57.70 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/46.231.57.70/ 
 PL - 1H : (64)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN21021 
 
 IP : 46.231.57.70 
 
 CIDR : 46.231.56.0/21 
 
 PREFIX COUNT : 40 
 
 UNIQUE IP COUNT : 591104 
 
 
 WYKRYTE ATAKI Z ASN21021 :  
  1H - 1 
  3H - 3 
  6H - 3 
 12H - 3 
 24H - 3 
 
 INFO : SERVER - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-23 16:52:21

Recently Reported IPs

27.230.238.13 104.18.21.65 104.18.21.69 104.18.21.71
104.18.21.74 104.18.21.76 104.18.21.78 104.18.21.87
104.18.210.83 104.18.212.42 104.18.212.85 104.18.213.42
104.18.213.85 104.18.215.90 104.18.216.17 104.18.216.26
104.18.216.62 104.18.216.7 104.18.216.76 104.18.216.90