Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.10.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63509
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.10.18.			IN	A

;; AUTHORITY SECTION:
.			330	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 176 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:29:06 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 18.10.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.10.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.76.158.139 attack
(sshd) Failed SSH login from 180.76.158.139 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 22 20:06:05 elude sshd[28040]: Invalid user ssha from 180.76.158.139 port 42020
Jul 22 20:06:07 elude sshd[28040]: Failed password for invalid user ssha from 180.76.158.139 port 42020 ssh2
Jul 22 20:12:16 elude sshd[29087]: Invalid user server from 180.76.158.139 port 50554
Jul 22 20:12:18 elude sshd[29087]: Failed password for invalid user server from 180.76.158.139 port 50554 ssh2
Jul 22 20:14:52 elude sshd[29473]: Invalid user tnt from 180.76.158.139 port 52516
2020-07-23 02:15:46
106.52.130.172 attackbotsspam
Jul 22 10:08:42 dignus sshd[31278]: Failed password for invalid user webadmin from 106.52.130.172 port 46790 ssh2
Jul 22 10:12:39 dignus sshd[31776]: Invalid user dev from 106.52.130.172 port 37626
Jul 22 10:12:39 dignus sshd[31776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.130.172
Jul 22 10:12:41 dignus sshd[31776]: Failed password for invalid user dev from 106.52.130.172 port 37626 ssh2
Jul 22 10:16:53 dignus sshd[32281]: Invalid user melendez from 106.52.130.172 port 56698
...
2020-07-23 02:44:15
180.71.58.82 attack
Jul 22 14:06:07 XXXXXX sshd[54552]: Invalid user manon from 180.71.58.82 port 50929
2020-07-23 02:34:07
178.239.116.142 attackspam
xmlrpc attack
2020-07-23 02:08:21
140.143.39.177 attack
Jul 22 14:05:11 mail sshd\[47053\]: Invalid user app from 140.143.39.177
Jul 22 14:05:11 mail sshd\[47053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.39.177
...
2020-07-23 02:16:32
150.136.167.99 attackbots
Jul 22 17:51:01 buvik sshd[1721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.167.99
Jul 22 17:51:03 buvik sshd[1721]: Failed password for invalid user wsp from 150.136.167.99 port 49894 ssh2
Jul 22 17:56:37 buvik sshd[2522]: Invalid user noc from 150.136.167.99
...
2020-07-23 02:11:16
185.46.18.99 attackbotsspam
2020-07-22T10:54:13.649967linuxbox-skyline sshd[136563]: Invalid user julius from 185.46.18.99 port 50332
...
2020-07-23 02:03:53
191.191.96.103 attack
2020-07-22T16:28:33.832305abusebot.cloudsearch.cf sshd[30743]: Invalid user wangfei from 191.191.96.103 port 38010
2020-07-22T16:28:33.841813abusebot.cloudsearch.cf sshd[30743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.191.96.103
2020-07-22T16:28:33.832305abusebot.cloudsearch.cf sshd[30743]: Invalid user wangfei from 191.191.96.103 port 38010
2020-07-22T16:28:36.146857abusebot.cloudsearch.cf sshd[30743]: Failed password for invalid user wangfei from 191.191.96.103 port 38010 ssh2
2020-07-22T16:36:13.971823abusebot.cloudsearch.cf sshd[30960]: Invalid user zouying from 191.191.96.103 port 45042
2020-07-22T16:36:13.978231abusebot.cloudsearch.cf sshd[30960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.191.96.103
2020-07-22T16:36:13.971823abusebot.cloudsearch.cf sshd[30960]: Invalid user zouying from 191.191.96.103 port 45042
2020-07-22T16:36:16.097749abusebot.cloudsearch.cf sshd[30960]: Faile
...
2020-07-23 02:10:28
122.254.11.177 attackbots
Hits on port : 23
2020-07-23 02:32:15
171.36.129.173 attackbots
Tried our host z.
2020-07-23 02:06:43
193.169.253.27 attackspam
Jul 22 16:52:42 zeus postfix/smtpd[32313]: warning: unknown[193.169.253.27]: SASL LOGIN authentication failed: authentication failure
Jul 22 17:04:19 zeus postfix/smtpd[808]: warning: unknown[193.169.253.27]: SASL LOGIN authentication failed: authentication failure
Jul 22 17:14:17 zeus postfix/smtpd[1998]: warning: unknown[193.169.253.27]: SASL LOGIN authentication failed: authentication failure
...
2020-07-23 02:07:02
192.144.234.204 attackspam
SSH bruteforce
2020-07-23 02:26:23
190.147.33.171 attack
Jul 22 18:07:34 rocket sshd[14646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.33.171
Jul 22 18:07:36 rocket sshd[14646]: Failed password for invalid user gmz from 190.147.33.171 port 46332 ssh2
...
2020-07-23 02:25:51
122.117.88.78 attack
Telnet Server BruteForce Attack
2020-07-23 02:38:16
51.178.87.42 attack
Jul 22 20:20:12 pornomens sshd\[6963\]: Invalid user tcl from 51.178.87.42 port 52138
Jul 22 20:20:12 pornomens sshd\[6963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.87.42
Jul 22 20:20:14 pornomens sshd\[6963\]: Failed password for invalid user tcl from 51.178.87.42 port 52138 ssh2
...
2020-07-23 02:27:06

Recently Reported IPs

104.21.10.177 104.21.11.11 104.21.10.13 104.21.11.228
104.21.10.9 104.21.11.78 104.21.11.44 104.21.12.134
104.21.12.247 104.21.12.39 104.21.12.28 104.21.12.30
104.21.12.43 104.21.11.89 104.21.13.133 104.21.12.47
104.21.12.76 104.21.13.160 104.21.13.195 104.21.14.175