Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.86.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10415
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.86.18.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:08:13 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 18.86.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.86.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
168.232.197.11 attack
Nov  6 20:55:06 sachi sshd\[27589\]: Invalid user undress from 168.232.197.11
Nov  6 20:55:06 sachi sshd\[27589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-232-197-11.static.konectivatelecomunicacoes.com.br
Nov  6 20:55:08 sachi sshd\[27589\]: Failed password for invalid user undress from 168.232.197.11 port 51572 ssh2
Nov  6 20:59:34 sachi sshd\[27930\]: Invalid user pearl from 168.232.197.11
Nov  6 20:59:34 sachi sshd\[27930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-232-197-11.static.konectivatelecomunicacoes.com.br
2019-11-07 19:01:10
222.186.175.169 attack
2019-11-06 UTC: 4x - (4x)
2019-11-07 18:57:56
142.93.212.69 attackspambots
Nov  7 12:34:41 www sshd\[16324\]: Invalid user gambaa from 142.93.212.69
Nov  7 12:34:41 www sshd\[16324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.69
Nov  7 12:34:43 www sshd\[16324\]: Failed password for invalid user gambaa from 142.93.212.69 port 57050 ssh2
...
2019-11-07 18:56:33
167.71.111.16 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-11-07 18:57:36
139.162.108.129 attackspambots
Honeypot hit.
2019-11-07 18:40:49
14.161.36.215 attack
14.161.36.215 - - \[07/Nov/2019:08:54:20 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
14.161.36.215 - - \[07/Nov/2019:08:54:21 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-07 19:00:55
183.157.172.22 attackbotsspam
invalid user
2019-11-07 18:59:07
45.116.230.86 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/45.116.230.86/ 
 
 IN - 1H : (77)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IN 
 NAME ASN : ASN133301 
 
 IP : 45.116.230.86 
 
 CIDR : 45.116.230.0/24 
 
 PREFIX COUNT : 14 
 
 UNIQUE IP COUNT : 3584 
 
 
 ATTACKS DETECTED ASN133301 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-07 07:25:00 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-11-07 18:30:10
217.29.18.206 attack
proto=tcp  .  spt=41677  .  dpt=25  .     (Listed on    unsubscore also rbldns-ru and manitu-net)     (368)
2019-11-07 18:49:26
157.55.39.181 attackbots
Automatic report - Banned IP Access
2019-11-07 18:32:26
49.234.28.54 attackspambots
2019-11-07T18:33:40.372377luisaranguren sshd[3372251]: Connection from 49.234.28.54 port 41652 on 10.10.10.6 port 22
2019-11-07T18:33:43.167014luisaranguren sshd[3372251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54  user=root
2019-11-07T18:33:45.217252luisaranguren sshd[3372251]: Failed password for root from 49.234.28.54 port 41652 ssh2
2019-11-07T18:39:48.933685luisaranguren sshd[3372904]: Connection from 49.234.28.54 port 39214 on 10.10.10.6 port 22
2019-11-07T18:39:50.834223luisaranguren sshd[3372904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54  user=root
2019-11-07T18:39:53.601823luisaranguren sshd[3372904]: Failed password for root from 49.234.28.54 port 39214 ssh2
...
2019-11-07 18:47:21
37.59.224.39 attack
Nov  7 10:25:15 SilenceServices sshd[18189]: Failed password for root from 37.59.224.39 port 36203 ssh2
Nov  7 10:29:16 SilenceServices sshd[19289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.224.39
Nov  7 10:29:18 SilenceServices sshd[19289]: Failed password for invalid user zhuai from 37.59.224.39 port 55255 ssh2
2019-11-07 18:55:41
178.128.217.58 attackbots
Nov  7 08:55:14 markkoudstaal sshd[2584]: Failed password for root from 178.128.217.58 port 34550 ssh2
Nov  7 08:59:39 markkoudstaal sshd[2902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58
Nov  7 08:59:41 markkoudstaal sshd[2902]: Failed password for invalid user pankaj from 178.128.217.58 port 43532 ssh2
2019-11-07 18:38:27
209.97.159.155 attack
wp bruteforce
2019-11-07 18:47:59
59.94.197.44 attackbotsspam
Telnet Server BruteForce Attack
2019-11-07 18:35:10

Recently Reported IPs

104.21.86.17 104.21.86.174 104.21.86.180 104.21.86.181
104.21.86.175 104.21.86.178 104.21.86.177 104.21.86.182
104.21.86.184 104.21.86.183 104.21.86.186 104.21.86.185
104.21.86.188 104.21.86.187 104.21.86.190 104.21.86.192
104.21.86.19 104.21.86.193 104.21.86.196 104.21.86.197