Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.59.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.59.10.			IN	A

;; AUTHORITY SECTION:
.			295	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 00:46:17 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 10.59.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 10.59.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.82.33.71 attack
Autoban   45.82.33.71 AUTH/CONNECT
2019-08-06 14:27:56
106.12.208.211 attack
2019-08-06T02:52:54.466691mizuno.rwx.ovh sshd[10162]: Connection from 106.12.208.211 port 38060 on 78.46.61.178 port 22
2019-08-06T02:52:55.713413mizuno.rwx.ovh sshd[10162]: Invalid user sport from 106.12.208.211 port 38060
2019-08-06T02:52:55.716676mizuno.rwx.ovh sshd[10162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.211
2019-08-06T02:52:54.466691mizuno.rwx.ovh sshd[10162]: Connection from 106.12.208.211 port 38060 on 78.46.61.178 port 22
2019-08-06T02:52:55.713413mizuno.rwx.ovh sshd[10162]: Invalid user sport from 106.12.208.211 port 38060
2019-08-06T02:52:57.803551mizuno.rwx.ovh sshd[10162]: Failed password for invalid user sport from 106.12.208.211 port 38060 ssh2
...
2019-08-06 13:57:40
51.254.199.12 attackspambots
BadRequests
2019-08-06 14:09:52
68.183.65.165 attack
Automatic report - Banned IP Access
2019-08-06 14:23:54
139.228.5.114 attackspam
Aug  6 02:30:59 localhost sshd\[22353\]: Invalid user pi from 139.228.5.114 port 43760
Aug  6 02:30:59 localhost sshd\[22355\]: Invalid user pi from 139.228.5.114 port 43764
...
2019-08-06 14:03:41
51.75.147.100 attackbotsspam
Aug  6 07:16:41 vps sshd[30679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.147.100 
Aug  6 07:16:43 vps sshd[30679]: Failed password for invalid user teamspeak from 51.75.147.100 port 39154 ssh2
Aug  6 07:25:49 vps sshd[31020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.147.100 
...
2019-08-06 14:34:35
51.68.231.147 attack
Aug  6 06:12:51 localhost sshd\[28413\]: Invalid user polycom from 51.68.231.147 port 40224
Aug  6 06:12:51 localhost sshd\[28413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.231.147
...
2019-08-06 13:28:50
35.201.243.170 attackbotsspam
Aug  6 07:27:26 vps691689 sshd[7239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.201.243.170
Aug  6 07:27:28 vps691689 sshd[7239]: Failed password for invalid user team2 from 35.201.243.170 port 37460 ssh2
...
2019-08-06 13:44:10
83.250.212.237 attackbots
Honeypot attack, port: 23, PTR: c83-250-212-237.bredband.comhem.se.
2019-08-06 13:57:58
218.69.91.84 attackbotsspam
Aug  6 01:38:22 xtremcommunity sshd\[19669\]: Invalid user opc from 218.69.91.84 port 55953
Aug  6 01:38:22 xtremcommunity sshd\[19669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.69.91.84
Aug  6 01:38:24 xtremcommunity sshd\[19669\]: Failed password for invalid user opc from 218.69.91.84 port 55953 ssh2
Aug  6 01:44:10 xtremcommunity sshd\[19895\]: Invalid user com from 218.69.91.84 port 52947
Aug  6 01:44:10 xtremcommunity sshd\[19895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.69.91.84
...
2019-08-06 13:58:29
113.253.255.179 attackspam
port scan and connect, tcp 23 (telnet)
2019-08-06 14:32:22
5.62.41.134 attackbotsspam
\[2019-08-06 01:49:02\] NOTICE\[2288\] chan_sip.c: Registration from '\' failed for '5.62.41.134:1000' - Wrong password
\[2019-08-06 01:49:02\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-06T01:49:02.199-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="69890",SessionID="0x7ff4d058ea08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.134/56511",Challenge="2786beb7",ReceivedChallenge="2786beb7",ReceivedHash="fa5459d7049a1f2aff7ebcc46ed44b2a"
\[2019-08-06 01:49:44\] NOTICE\[2288\] chan_sip.c: Registration from '\' failed for '5.62.41.134:1148' - Wrong password
\[2019-08-06 01:49:44\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-06T01:49:44.687-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="25426",SessionID="0x7ff4d058ea08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.134/5
2019-08-06 14:03:22
150.242.110.5 attack
Automatic report - Banned IP Access
2019-08-06 13:50:32
37.115.184.193 attackbotsspam
CMS scan: wordpress
2019-08-06 14:28:29
222.186.160.241 attackbotsspam
Unauthorized connection attempt from IP address 222.186.160.241 on Port 3306(MYSQL)
2019-08-06 14:37:14

Recently Reported IPs

104.21.58.97 104.21.59.100 104.21.59.103 104.21.59.110
104.21.59.112 102.136.9.210 104.21.59.113 104.21.59.114
108.158.186.9 104.21.59.115 42.238.247.58 104.21.59.117
104.21.59.122 104.21.59.124 248.69.240.196 104.21.59.125
203.50.219.115 104.21.59.127 104.21.59.13 104.21.59.131