Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.118.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.118.69.			IN	A

;; AUTHORITY SECTION:
.			311	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 18:43:32 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 69.118.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.118.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.223.105.208 attack
[portscan] Port scan
2019-12-25 22:48:07
201.13.161.80 attackspam
Automatic report - Port Scan Attack
2019-12-25 23:25:07
132.232.43.115 attack
Dec 25 02:12:42 plusreed sshd[16197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.43.115  user=root
Dec 25 02:12:44 plusreed sshd[16197]: Failed password for root from 132.232.43.115 port 51336 ssh2
...
2019-12-25 22:57:04
159.65.255.153 attack
Invalid user backup from 159.65.255.153 port 49590
2019-12-25 22:56:15
112.160.147.67 attackspam
SSH/22 MH Probe, BF, Hack -
2019-12-25 23:08:57
220.163.66.124 attack
Scanning
2019-12-25 22:52:19
92.50.161.129 attackspambots
Unauthorized connection attempt detected from IP address 92.50.161.129 to port 445
2019-12-25 23:17:42
58.96.51.198 attack
SSH/22 MH Probe, BF, Hack -
2019-12-25 22:48:56
222.186.175.169 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Failed password for root from 222.186.175.169 port 62784 ssh2
Failed password for root from 222.186.175.169 port 62784 ssh2
Failed password for root from 222.186.175.169 port 62784 ssh2
Failed password for root from 222.186.175.169 port 62784 ssh2
2019-12-25 23:07:43
45.77.42.233 attackspam
2019-12-25 22:49:59
185.36.81.233 attackbots
Dec 25 09:57:33 web1 postfix/smtpd[22282]: warning: unknown[185.36.81.233]: SASL LOGIN authentication failed: authentication failure
...
2019-12-25 22:57:41
218.92.0.168 attackspam
$f2bV_matches
2019-12-25 23:26:50
201.55.126.57 attackspambots
Dec 25 16:07:22 legacy sshd[30327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.126.57
Dec 25 16:07:24 legacy sshd[30327]: Failed password for invalid user keseris from 201.55.126.57 port 47140 ssh2
Dec 25 16:12:29 legacy sshd[30480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.126.57
...
2019-12-25 23:14:31
138.197.98.251 attack
Dec 25 20:25:23 vibhu-HP-Z238-Microtower-Workstation sshd\[11963\]: Invalid user mikihiko from 138.197.98.251
Dec 25 20:25:23 vibhu-HP-Z238-Microtower-Workstation sshd\[11963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.98.251
Dec 25 20:25:25 vibhu-HP-Z238-Microtower-Workstation sshd\[11963\]: Failed password for invalid user mikihiko from 138.197.98.251 port 38438 ssh2
Dec 25 20:27:11 vibhu-HP-Z238-Microtower-Workstation sshd\[12031\]: Invalid user hung from 138.197.98.251
Dec 25 20:27:11 vibhu-HP-Z238-Microtower-Workstation sshd\[12031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.98.251
...
2019-12-25 23:10:04
46.101.171.183 attackbotsspam
fail2ban honeypot
2019-12-25 22:58:59

Recently Reported IPs

104.21.116.209 104.21.196.2 104.21.201.233 104.21.201.76
104.21.204.206 104.21.207.127 104.21.207.235 104.21.209.197
104.21.215.142 104.21.223.62 104.21.224.11 104.21.226.107
104.21.228.103 104.21.228.12 104.22.1.120 104.22.1.14
104.22.1.20 104.22.1.207 104.22.1.221 104.22.1.36