Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.18.76 normal
The hostname for this IP is minecraftworldmap.com
2022-07-23 06:23:40
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.18.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58340
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.18.157.			IN	A

;; AUTHORITY SECTION:
.			566	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 18:24:58 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 157.18.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.18.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.152.43.73 attack
$f2bV_matches
2020-03-07 19:31:41
8.208.25.133 attack
Authentication failed
2020-03-07 19:27:29
163.204.11.227 attackbots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-07 19:38:26
107.200.127.153 attack
Mar  5 02:36:14 hosting180 sshd[30135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107-200-127-153.lightspeed.chrlnc.sbcglobal.net
Mar  5 02:36:14 hosting180 sshd[30135]: Invalid user pi from 107.200.127.153 port 51612
Mar  5 02:36:17 hosting180 sshd[30135]: Failed password for invalid user pi from 107.200.127.153 port 51612 ssh2
...
2020-03-07 19:16:12
162.247.74.200 attackspam
SSH bruteforce
2020-03-07 19:06:45
94.23.219.41 attack
Automatic report - XMLRPC Attack
2020-03-07 19:05:28
180.76.135.236 attackspambots
$f2bV_matches
2020-03-07 19:21:38
117.50.20.112 attack
DATE:2020-03-07 08:02:18, IP:117.50.20.112, PORT:ssh SSH brute force auth (docker-dc)
2020-03-07 19:04:59
94.183.87.121 attackbotsspam
Honeypot attack, port: 4567, PTR: 94-183-87-121.shatel.ir.
2020-03-07 19:06:23
89.144.47.246 attackspambots
firewall-block, port(s): 3389/tcp
2020-03-07 19:43:48
185.176.27.162 attackspambots
firewall-block, port(s): 8888/tcp, 13489/tcp
2020-03-07 19:24:57
103.145.253.145 attack
SASL broute force
2020-03-07 19:48:41
78.157.209.196 attackbots
SSH Brute-Forcing (server2)
2020-03-07 19:03:08
123.235.36.26 attack
Mar  7 11:37:31 ns382633 sshd\[32159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.235.36.26  user=root
Mar  7 11:37:33 ns382633 sshd\[32159\]: Failed password for root from 123.235.36.26 port 4077 ssh2
Mar  7 11:41:51 ns382633 sshd\[501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.235.36.26  user=root
Mar  7 11:41:53 ns382633 sshd\[501\]: Failed password for root from 123.235.36.26 port 34194 ssh2
Mar  7 11:44:14 ns382633 sshd\[724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.235.36.26  user=root
2020-03-07 19:48:21
190.39.101.25 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-07 19:27:01

Recently Reported IPs

104.21.18.154 104.21.18.158 249.167.205.82 104.21.18.16
104.21.18.169 104.21.18.173 104.21.18.174 104.21.18.175
104.21.18.176 104.21.18.177 104.21.18.181 104.21.18.189
110.130.174.110 104.21.18.190 104.21.18.192 104.21.18.193
100.248.181.164 104.21.18.199 104.21.18.2 104.21.18.200