Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.10.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.10.75.			IN	A

;; AUTHORITY SECTION:
.			526	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 17:34:54 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 75.10.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.10.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.213.162 attackbotsspam
Sep  3 19:34:04 kapalua sshd\[8056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.213.162  user=root
Sep  3 19:34:06 kapalua sshd\[8056\]: Failed password for root from 106.12.213.162 port 45538 ssh2
Sep  3 19:40:01 kapalua sshd\[8814\]: Invalid user tempo from 106.12.213.162
Sep  3 19:40:01 kapalua sshd\[8814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.213.162
Sep  3 19:40:03 kapalua sshd\[8814\]: Failed password for invalid user tempo from 106.12.213.162 port 33524 ssh2
2019-09-04 15:58:49
113.125.19.85 attackbotsspam
Sep  4 08:54:03 fr01 sshd[4135]: Invalid user guinness from 113.125.19.85
Sep  4 08:54:03 fr01 sshd[4135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.19.85
Sep  4 08:54:03 fr01 sshd[4135]: Invalid user guinness from 113.125.19.85
Sep  4 08:54:06 fr01 sshd[4135]: Failed password for invalid user guinness from 113.125.19.85 port 38244 ssh2
...
2019-09-04 16:07:31
159.65.176.156 attackspambots
Sep  4 05:07:22 XXX sshd[37474]: Invalid user jasper from 159.65.176.156 port 58377
2019-09-04 15:49:09
95.9.139.200 attackspam
Automatic report - Port Scan Attack
2019-09-04 16:34:04
18.27.197.252 attack
Sep  3 22:00:55 web9 sshd\[23325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.27.197.252  user=root
Sep  3 22:00:58 web9 sshd\[23325\]: Failed password for root from 18.27.197.252 port 37806 ssh2
Sep  3 22:01:00 web9 sshd\[23325\]: Failed password for root from 18.27.197.252 port 37806 ssh2
Sep  3 22:01:03 web9 sshd\[23325\]: Failed password for root from 18.27.197.252 port 37806 ssh2
Sep  3 22:01:05 web9 sshd\[23325\]: Failed password for root from 18.27.197.252 port 37806 ssh2
2019-09-04 16:12:47
185.220.102.8 attackbots
Sep  4 09:43:57 icinga sshd[12799]: Failed password for root from 185.220.102.8 port 37959 ssh2
Sep  4 09:44:09 icinga sshd[12799]: error: maximum authentication attempts exceeded for root from 185.220.102.8 port 37959 ssh2 [preauth]
...
2019-09-04 15:56:58
58.213.128.106 attackspam
Sep  4 09:53:31 nextcloud sshd\[17011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.128.106  user=root
Sep  4 09:53:33 nextcloud sshd\[17011\]: Failed password for root from 58.213.128.106 port 2241 ssh2
Sep  4 09:57:26 nextcloud sshd\[22975\]: Invalid user sysadm from 58.213.128.106
Sep  4 09:57:26 nextcloud sshd\[22975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.128.106
...
2019-09-04 16:06:30
118.24.36.247 attack
Sep  4 07:34:42 apollo sshd\[28092\]: Invalid user leo from 118.24.36.247Sep  4 07:34:44 apollo sshd\[28092\]: Failed password for invalid user leo from 118.24.36.247 port 54086 ssh2Sep  4 07:55:33 apollo sshd\[28172\]: Invalid user romaric from 118.24.36.247
...
2019-09-04 16:29:48
42.104.97.227 attackbotsspam
Sep  4 09:40:52 minden010 sshd[14630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.227
Sep  4 09:40:55 minden010 sshd[14630]: Failed password for invalid user ginger from 42.104.97.227 port 20879 ssh2
Sep  4 09:45:11 minden010 sshd[16088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.227
...
2019-09-04 15:52:32
60.170.183.16 attackspam
23/tcp 23/tcp 23/tcp...
[2019-08-17/09-04]4pkt,1pt.(tcp)
2019-09-04 16:17:49
125.124.152.133 attackspambots
Sep  4 07:40:38 nextcloud sshd\[4150\]: Invalid user altibase from 125.124.152.133
Sep  4 07:40:38 nextcloud sshd\[4150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.152.133
Sep  4 07:40:40 nextcloud sshd\[4150\]: Failed password for invalid user altibase from 125.124.152.133 port 33843 ssh2
...
2019-09-04 16:32:40
206.189.149.170 attack
Automatic report - Banned IP Access
2019-09-04 16:27:53
171.236.6.7 attack
Sep  4 03:10:33 XXX sshd[28242]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:33 XXX sshd[28241]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:33 XXX sshd[28240]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:33 XXX sshd[28245]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:33 XXX sshd[28244]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:33 XXX sshd[28243]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:33 XXX sshd[28250]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:33 XXX sshd[28249]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:33 XXX sshd[28246]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:33 XXX sshd[28248]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:33 XXX sshd[28247]: Did not receive identification string from 171.236.6.7
Sep  4 03:10:41 ........
-------------------------------
2019-09-04 15:58:25
119.10.114.5 attackbots
Sep  4 09:34:14 saschabauer sshd[29210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.114.5
Sep  4 09:34:16 saschabauer sshd[29210]: Failed password for invalid user xv from 119.10.114.5 port 61426 ssh2
2019-09-04 16:15:49
157.230.7.0 attackspambots
2019-09-04T06:33:20.970419abusebot.cloudsearch.cf sshd\[22604\]: Invalid user server from 157.230.7.0 port 46314
2019-09-04 15:56:05

Recently Reported IPs

104.21.10.72 104.21.10.8 42.221.114.175 104.21.10.80
100.185.55.157 104.21.10.86 134.45.2.173 104.21.10.88
52.93.196.137 104.21.10.91 104.21.10.94 104.21.10.95
104.21.10.98 104.21.10.99 104.21.11.103 104.21.11.105
104.21.11.106 104.21.11.108 104.21.11.110 104.21.11.118