Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.37.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11173
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.37.118.			IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:26:25 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 118.37.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.37.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.211.75.184 attackbotsspam
Nov 30 19:31:11 server sshd\[29872\]: Invalid user rosenbalm from 129.211.75.184
Nov 30 19:31:11 server sshd\[29872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.75.184 
Nov 30 19:31:13 server sshd\[29872\]: Failed password for invalid user rosenbalm from 129.211.75.184 port 55110 ssh2
Nov 30 19:52:06 server sshd\[2644\]: Invalid user vana from 129.211.75.184
Nov 30 19:52:06 server sshd\[2644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.75.184 
...
2019-12-01 05:34:03
188.92.77.235 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-01 05:56:04
63.81.87.177 attackbots
Nov 30 15:27:48  exim[4019]: [1\52] 1ib3is-00012p-Ce H=secret.jcnovel.com (secret.ingraqm.com) [63.81.87.177] F= rejected after DATA: This message scored 100.6 spam points.
2019-12-01 06:06:52
38.121.63.198 attackspam
Lines containing failures of 38.121.63.198
Nov 28 18:43:41 shared06 sshd[30532]: Invalid user modesty from 38.121.63.198 port 56902
Nov 28 18:43:41 shared06 sshd[30532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.121.63.198
Nov 28 18:43:43 shared06 sshd[30532]: Failed password for invalid user modesty from 38.121.63.198 port 56902 ssh2
Nov 28 18:43:44 shared06 sshd[30532]: Received disconnect from 38.121.63.198 port 56902:11: Bye Bye [preauth]
Nov 28 18:43:44 shared06 sshd[30532]: Disconnected from invalid user modesty 38.121.63.198 port 56902 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=38.121.63.198
2019-12-01 05:41:39
160.20.12.127 attackbotsspam
160.20.12.127 has been banned for [spam]
...
2019-12-01 05:48:29
119.193.147.225 attackspam
Nov 30 15:28:04 vmd17057 sshd\[5466\]: Invalid user juge from 119.193.147.225 port 48696
Nov 30 15:28:04 vmd17057 sshd\[5466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.193.147.225
Nov 30 15:28:06 vmd17057 sshd\[5466\]: Failed password for invalid user juge from 119.193.147.225 port 48696 ssh2
...
2019-12-01 06:03:52
78.110.60.23 attackbots
Nov 30 20:42:54 server sshd\[15745\]: Invalid user akana from 78.110.60.23
Nov 30 20:42:55 server sshd\[15745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.110.60.23 
Nov 30 20:42:57 server sshd\[15745\]: Failed password for invalid user akana from 78.110.60.23 port 37434 ssh2
Nov 30 21:01:22 server sshd\[20457\]: Invalid user http from 78.110.60.23
Nov 30 21:01:22 server sshd\[20457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.110.60.23 
...
2019-12-01 05:55:10
103.87.207.230 attackspam
Nov 30 15:28:17 MK-Soft-VM8 sshd[20777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.87.207.230 
Nov 30 15:28:18 MK-Soft-VM8 sshd[20777]: Failed password for invalid user ubnt from 103.87.207.230 port 49693 ssh2
...
2019-12-01 05:57:46
139.59.13.223 attack
Nov 30 04:13:10 sshd[15716]: Connection from 139.59.13.223 port 54896 on server
Nov 30 04:13:11 sshd[15716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.13.223  user=root
Nov 30 04:13:14 sshd[15716]: Failed password for root from 139.59.13.223 port 54896 ssh2
Nov 30 04:13:14 sshd[15716]: Received disconnect from 139.59.13.223: 11: Bye Bye [preauth]
Nov 30 04:16:50 sshd[15752]: Connection from 139.59.13.223 port 33862 on server
Nov 30 04:16:51 sshd[15752]: Invalid user com from 139.59.13.223
Nov 30 04:16:51 sshd[15752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.13.223
Nov 30 04:16:53 sshd[15752]: Failed password for invalid user com from 139.59.13.223 port 33862 ssh2
Nov 30 04:16:53 sshd[15752]: Received disconnect from 139.59.13.223: 11: Bye Bye [preauth]
Nov 30 04:20:39 sshd[15786]: Connection from 139.59.13.223 port 41066 on server
Nov 30 04:20:40 sshd[15786]: Invalid user m0th3r from 139.59.13.223
Nov 30
2019-12-01 05:56:58
122.176.93.58 attack
Nov 30 16:12:48 ws19vmsma01 sshd[228561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.93.58
Nov 30 16:12:50 ws19vmsma01 sshd[228561]: Failed password for invalid user wwwrun from 122.176.93.58 port 54893 ssh2
...
2019-12-01 05:46:42
159.89.134.199 attackspambots
Nov 30 05:13:32 php1 sshd\[5571\]: Invalid user guest from 159.89.134.199
Nov 30 05:13:32 php1 sshd\[5571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.199
Nov 30 05:13:34 php1 sshd\[5571\]: Failed password for invalid user guest from 159.89.134.199 port 58320 ssh2
Nov 30 05:16:51 php1 sshd\[5810\]: Invalid user neitzel from 159.89.134.199
Nov 30 05:16:51 php1 sshd\[5810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.199
2019-12-01 05:53:40
74.82.47.27 attackspam
3389BruteforceFW21
2019-12-01 05:42:10
106.54.48.29 attack
Nov 30 19:45:44 server sshd\[1035\]: Invalid user admin from 106.54.48.29
Nov 30 19:45:44 server sshd\[1035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.48.29 
Nov 30 19:45:46 server sshd\[1035\]: Failed password for invalid user admin from 106.54.48.29 port 46816 ssh2
Nov 30 19:52:20 server sshd\[2689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.48.29  user=root
Nov 30 19:52:22 server sshd\[2689\]: Failed password for root from 106.54.48.29 port 38760 ssh2
...
2019-12-01 05:54:50
139.5.159.167 attackbotsspam
Unauthorized IMAP connection attempt
2019-12-01 05:58:18
180.76.57.245 attack
port scan and connect, tcp 23 (telnet)
2019-12-01 05:46:06

Recently Reported IPs

104.21.37.101 104.21.37.125 104.21.37.122 104.21.37.126
104.21.37.124 104.21.37.135 104.21.37.116 104.21.69.206
104.21.37.12 104.21.37.120 104.21.37.139 104.21.37.138
104.21.37.140 104.21.37.141 104.21.37.15 104.21.69.209
104.21.37.155 104.21.37.16 104.21.37.161 104.21.37.185