Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.51.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.51.218.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:35:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 218.51.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 218.51.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
47.57.6.243 attack
TCP ports : 10831 / 13804
2020-09-19 20:52:25
54.38.185.131 attackbotsspam
Time:     Thu Sep 17 15:52:25 2020 -0400
IP:       54.38.185.131 (FR/France/131.ip-54-38-185.eu)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 17 15:44:21 ams-11 sshd[22631]: Invalid user ilie from 54.38.185.131 port 54446
Sep 17 15:44:24 ams-11 sshd[22631]: Failed password for invalid user ilie from 54.38.185.131 port 54446 ssh2
Sep 17 15:49:19 ams-11 sshd[22795]: Failed password for root from 54.38.185.131 port 57024 ssh2
Sep 17 15:52:19 ams-11 sshd[22902]: Invalid user doug from 54.38.185.131 port 46396
Sep 17 15:52:20 ams-11 sshd[22902]: Failed password for invalid user doug from 54.38.185.131 port 46396 ssh2
2020-09-19 20:52:10
212.70.149.52 attackspambots
Sep 19 14:08:52 galaxy event: galaxy/lswi: smtp: kultura@uni-potsdam.de [212.70.149.52] authentication failure using internet password
Sep 19 14:09:18 galaxy event: galaxy/lswi: smtp: phantom@uni-potsdam.de [212.70.149.52] authentication failure using internet password
Sep 19 14:09:44 galaxy event: galaxy/lswi: smtp: testblog@uni-potsdam.de [212.70.149.52] authentication failure using internet password
Sep 19 14:10:10 galaxy event: galaxy/lswi: smtp: 114@uni-potsdam.de [212.70.149.52] authentication failure using internet password
Sep 19 14:10:35 galaxy event: galaxy/lswi: smtp: bergen-gw7@uni-potsdam.de [212.70.149.52] authentication failure using internet password
...
2020-09-19 20:13:54
113.250.254.108 attack
20 attempts against mh-ssh on lake
2020-09-19 20:44:15
151.253.125.136 attack
$f2bV_matches
2020-09-19 20:43:55
190.73.31.9 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-19 20:42:34
88.202.239.164 attack
E-Mail Spam (RBL) [REJECTED]
2020-09-19 20:39:15
116.73.196.126 attackspambots
port scan and connect, tcp 23 (telnet)
2020-09-19 20:20:26
184.154.189.91 attackspambots
 TCP (SYN) 184.154.189.91:12411 -> port 70, len 44
2020-09-19 20:24:07
94.102.51.95 attack
Port scan on 6 port(s): 13870 16384 33403 41535 48140 62849
2020-09-19 20:27:22
112.85.42.232 attackbots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-19 20:22:05
125.78.208.247 attack
Invalid user lfy from 125.78.208.247 port 49516
2020-09-19 20:51:17
85.209.0.248 attackspambots
firewall-block, port(s): 22/tcp
2020-09-19 20:31:18
54.39.189.118 attack
CMS (WordPress or Joomla) login attempt.
2020-09-19 20:29:28
111.67.204.109 attackspambots
Invalid user sybase from 111.67.204.109 port 41910
2020-09-19 20:36:56

Recently Reported IPs

104.21.51.210 104.21.51.219 104.21.7.218 104.21.51.22
104.21.51.226 104.21.51.224 104.21.51.233 104.21.51.241
104.21.51.238 104.21.51.242 104.21.51.237 104.21.51.243
104.21.51.229 104.21.51.249 104.21.7.223 104.21.51.223
104.21.51.251 104.21.51.252 104.21.51.253 104.21.51.254