Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.58.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.58.11.			IN	A

;; AUTHORITY SECTION:
.			254	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 00:37:31 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 11.58.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.58.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.205.6.222 attackspam
ssh failed login
2019-09-08 12:44:38
149.129.242.80 attackspambots
Sep  8 01:56:31 SilenceServices sshd[7721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.242.80
Sep  8 01:56:33 SilenceServices sshd[7721]: Failed password for invalid user www-upload from 149.129.242.80 port 38856 ssh2
Sep  8 02:01:21 SilenceServices sshd[10368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.242.80
2019-09-08 12:58:49
190.7.128.74 attackbotsspam
Sep  8 07:07:43 [host] sshd[3938]: Invalid user www from 190.7.128.74
Sep  8 07:07:43 [host] sshd[3938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.7.128.74
Sep  8 07:07:44 [host] sshd[3938]: Failed password for invalid user www from 190.7.128.74 port 28108 ssh2
2019-09-08 13:15:43
106.12.38.109 attack
Sep  7 13:35:45 tdfoods sshd\[30336\]: Invalid user dspace from 106.12.38.109
Sep  7 13:35:45 tdfoods sshd\[30336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.109
Sep  7 13:35:47 tdfoods sshd\[30336\]: Failed password for invalid user dspace from 106.12.38.109 port 57858 ssh2
Sep  7 13:39:25 tdfoods sshd\[30737\]: Invalid user smbuser from 106.12.38.109
Sep  7 13:39:25 tdfoods sshd\[30737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.109
2019-09-08 13:21:39
150.140.189.33 attack
2019-09-08T06:09:48.257657  sshd[5960]: Invalid user kafka from 150.140.189.33 port 34358
2019-09-08T06:09:48.271475  sshd[5960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.140.189.33
2019-09-08T06:09:48.257657  sshd[5960]: Invalid user kafka from 150.140.189.33 port 34358
2019-09-08T06:09:50.758179  sshd[5960]: Failed password for invalid user kafka from 150.140.189.33 port 34358 ssh2
2019-09-08T06:26:27.765564  sshd[6084]: Invalid user gitlab from 150.140.189.33 port 54324
...
2019-09-08 12:50:02
198.23.251.111 attackspambots
Sep  8 04:58:42 www_kotimaassa_fi sshd[30573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.251.111
Sep  8 04:58:44 www_kotimaassa_fi sshd[30573]: Failed password for invalid user gitpass from 198.23.251.111 port 37174 ssh2
...
2019-09-08 13:04:43
79.188.68.90 attack
Sep  8 02:26:38 microserver sshd[9204]: Invalid user alex from 79.188.68.90 port 53845
Sep  8 02:26:38 microserver sshd[9204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.68.90
Sep  8 02:26:40 microserver sshd[9204]: Failed password for invalid user alex from 79.188.68.90 port 53845 ssh2
Sep  8 02:31:57 microserver sshd[9945]: Invalid user sinusbot from 79.188.68.90 port 48119
Sep  8 02:31:57 microserver sshd[9945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.68.90
Sep  8 02:42:30 microserver sshd[11375]: Invalid user oracle from 79.188.68.90 port 36669
Sep  8 02:42:30 microserver sshd[11375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.68.90
Sep  8 02:42:32 microserver sshd[11375]: Failed password for invalid user oracle from 79.188.68.90 port 36669 ssh2
Sep  8 02:47:49 microserver sshd[12100]: Invalid user teamspeak3 from 79.188.68.90 port 59184
Sep  8 02:4
2019-09-08 13:09:18
141.98.9.5 attack
Sep  8 03:00:33 relay postfix/smtpd\[9975\]: warning: unknown\[141.98.9.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 03:00:49 relay postfix/smtpd\[26181\]: warning: unknown\[141.98.9.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 03:01:12 relay postfix/smtpd\[6707\]: warning: unknown\[141.98.9.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 03:01:34 relay postfix/smtpd\[26181\]: warning: unknown\[141.98.9.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 03:01:58 relay postfix/smtpd\[26894\]: warning: unknown\[141.98.9.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-08 12:47:42
113.69.130.69 attack
Sep  8 00:50:08 mail postfix/smtpd[31514]: warning: unknown[113.69.130.69]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 00:50:16 mail postfix/smtpd[31514]: warning: unknown[113.69.130.69]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 00:50:29 mail postfix/smtpd[31514]: warning: unknown[113.69.130.69]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-08 13:10:22
139.59.85.59 attack
Sep  8 05:08:32 lnxweb61 sshd[5294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.85.59
2019-09-08 13:46:50
62.234.91.173 attack
Sep  8 05:47:28 DAAP sshd[25447]: Invalid user ts3 from 62.234.91.173 port 38044
...
2019-09-08 13:09:42
51.38.234.226 attack
Sep  8 04:05:50 www_kotimaassa_fi sshd[30116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.234.226
Sep  8 04:05:51 www_kotimaassa_fi sshd[30116]: Failed password for invalid user user from 51.38.234.226 port 45876 ssh2
...
2019-09-08 12:54:19
36.248.224.37 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-09-08 13:47:31
106.13.127.210 attackspambots
Sep  7 19:47:03 xtremcommunity sshd\[58167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.127.210  user=root
Sep  7 19:47:05 xtremcommunity sshd\[58167\]: Failed password for root from 106.13.127.210 port 55666 ssh2
Sep  7 19:55:53 xtremcommunity sshd\[58506\]: Invalid user xbmc from 106.13.127.210 port 58866
Sep  7 19:55:53 xtremcommunity sshd\[58506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.127.210
Sep  7 19:55:55 xtremcommunity sshd\[58506\]: Failed password for invalid user xbmc from 106.13.127.210 port 58866 ssh2
...
2019-09-08 13:23:17
91.144.190.17 attack
LGS,WP GET /wp-login.php
2019-09-08 12:46:27

Recently Reported IPs

104.21.58.109 186.145.155.138 104.21.58.111 104.21.58.116
104.21.58.12 104.21.58.122 104.21.58.124 104.21.58.125
104.21.58.126 104.21.58.127 104.21.58.129 104.21.58.132
254.173.9.192 104.21.58.133 104.21.58.136 104.21.58.139
104.21.58.14 104.21.58.142 104.21.58.146 104.21.58.149