Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.11.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39462
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.11.118.			IN	A

;; AUTHORITY SECTION:
.			429	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 17:36:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 118.11.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.11.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.67.204.109 attackbotsspam
Sep 21 11:34:03 ns3164893 sshd[26691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.204.109
Sep 21 11:34:06 ns3164893 sshd[26691]: Failed password for invalid user student from 111.67.204.109 port 10536 ssh2
...
2020-09-21 18:52:06
185.234.218.84 attackspam
Sep 21 10:31:45 mail postfix/smtpd\[19140\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 21 11:03:05 mail postfix/smtpd\[20283\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 21 11:13:32 mail postfix/smtpd\[20041\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 21 11:23:56 mail postfix/smtpd\[20789\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-21 18:40:14
117.44.60.211 attackspam
Blocked 117.44.60.211 For policy violation
2020-09-21 18:49:36
167.172.195.99 attack
(sshd) Failed SSH login from 167.172.195.99 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 21 05:53:52 idl1-dfw sshd[1738190]: Invalid user git from 167.172.195.99 port 35106
Sep 21 05:53:53 idl1-dfw sshd[1738190]: Failed password for invalid user git from 167.172.195.99 port 35106 ssh2
Sep 21 06:04:24 idl1-dfw sshd[1745897]: Invalid user info from 167.172.195.99 port 33806
Sep 21 06:04:27 idl1-dfw sshd[1745897]: Failed password for invalid user info from 167.172.195.99 port 33806 ssh2
Sep 21 06:08:06 idl1-dfw sshd[1748399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.195.99  user=root
2020-09-21 18:45:55
128.14.236.157 attack
$f2bV_matches
2020-09-21 18:58:24
45.174.163.130 attackbots
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=39451  .  dstport=80  .     (2295)
2020-09-21 18:42:52
93.43.216.241 attackbots
Port Scan: TCP/443
2020-09-21 18:51:24
101.231.146.34 attackspam
Sep 21 12:45:55 buvik sshd[1534]: Failed password for invalid user ftpuser from 101.231.146.34 port 35604 ssh2
Sep 21 12:51:37 buvik sshd[2305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.146.34  user=root
Sep 21 12:51:38 buvik sshd[2305]: Failed password for root from 101.231.146.34 port 39284 ssh2
...
2020-09-21 19:09:52
218.255.86.106 attackbotsspam
$f2bV_matches
2020-09-21 18:39:15
182.61.60.191 attackspambots
$f2bV_matches
2020-09-21 18:36:10
193.196.55.179 attack
Sep 21 03:22:15 scw-tender-jepsen sshd[11106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.196.55.179
Sep 21 03:22:17 scw-tender-jepsen sshd[11106]: Failed password for invalid user user from 193.196.55.179 port 41410 ssh2
2020-09-21 19:14:30
167.99.12.47 attackspam
Sep 21 12:06:51 10.23.102.230 wordpress(www.ruhnke.cloud)[41059]: Blocked authentication attempt for admin from 167.99.12.47
...
2020-09-21 18:37:16
165.22.223.121 attackspambots
Sep 21 08:46:23 marvibiene sshd[44633]: Invalid user nagios from 165.22.223.121 port 46000
Sep 21 08:46:23 marvibiene sshd[44633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.223.121
Sep 21 08:46:23 marvibiene sshd[44633]: Invalid user nagios from 165.22.223.121 port 46000
Sep 21 08:46:24 marvibiene sshd[44633]: Failed password for invalid user nagios from 165.22.223.121 port 46000 ssh2
2020-09-21 18:43:42
5.188.87.53 attackspam
SSH Bruteforce Attempt on Honeypot
2020-09-21 19:12:11
155.4.113.161 attackbots
(smtpauth) Failed SMTP AUTH login from 155.4.113.161 (SE/Sweden/h-113-161.A328.priv.bahnhof.se): 5 in the last 3600 secs
2020-09-21 19:07:02

Recently Reported IPs

104.21.11.110 104.21.11.120 104.21.11.121 104.21.11.122
163.83.123.192 104.21.11.123 104.21.11.127 104.21.11.128
104.21.11.13 104.21.11.131 104.21.11.133 104.21.11.134
104.21.11.141 104.21.11.154 104.21.11.156 104.21.11.157
104.21.11.163 104.21.11.166 104.21.11.170 123.113.140.39