Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.12.94 spambotsattackproxynormal
Ip
2022-05-11 11:40:42
104.18.116.17 attack
14red.com casino spam - casino with very bad reputation
Received: from HE1EUR01HT170.eop-EUR01.prod.protection.outlook.com (2603:10a6:802:1::35) by VI1PR0501MB2301.eurprd05.prod.outlook.com with HTTPS via VI1PR0902CA0046.EURPRD09.PROD.OUTLOOK.COM; Wed, 31 Jul 2019 16:52:30 +0000 Received: from HE1EUR01FT007.eop-EUR01.prod.protection.outlook.com (10.152.0.51) by HE1EUR01HT170.eop-EUR01.prod.protection.outlook.com (10.152.1.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2136.14; Wed, 31 Jul 2019 16:52:30 +0000 Authentication-Results: spf=none (sender IP is 169.159.171.139) smtp.mailfrom=luxido.cz; hotmail.co.uk; dkim=none (message not signed) header.d=none;hotmail.co.uk; dmarc=none action=none header.from=luxido.cz; Received-SPF: None (protection.outlook.com: luxido.cz does not designate permitted sender hosts) Received: from static-public-169.159.171.igen.co.za (169.159.171.139)
2019-08-01 05:33:34
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.1.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65022
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.1.2.			IN	A

;; AUTHORITY SECTION:
.			536	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021601 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 05:13:07 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 2.1.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.1.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.15 attackspam
2019-09-05T15:09:02.897251hub.schaetter.us sshd\[19941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.15  user=root
2019-09-05T15:09:04.477834hub.schaetter.us sshd\[19941\]: Failed password for root from 222.186.42.15 port 38450 ssh2
2019-09-05T15:09:06.939720hub.schaetter.us sshd\[19941\]: Failed password for root from 222.186.42.15 port 38450 ssh2
2019-09-05T15:09:09.653212hub.schaetter.us sshd\[19941\]: Failed password for root from 222.186.42.15 port 38450 ssh2
2019-09-05T15:09:13.365750hub.schaetter.us sshd\[19943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.15  user=root
...
2019-09-05 23:12:11
46.101.224.184 attackspambots
Sep  5 15:57:54 rpi sshd[25405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184 
Sep  5 15:57:56 rpi sshd[25405]: Failed password for invalid user test from 46.101.224.184 port 60910 ssh2
2019-09-05 22:05:13
117.211.167.48 attack
Unauthorized connection attempt from IP address 117.211.167.48 on Port 445(SMB)
2019-09-05 22:22:49
74.81.112.66 attack
Unauthorized connection attempt from IP address 74.81.112.66 on Port 445(SMB)
2019-09-05 22:13:12
129.204.58.180 attackspam
$f2bV_matches
2019-09-05 22:39:32
209.85.208.46 attackbotsspam
Attempt to login to email server on SMTP service on 05-09-2019 09:45:33.
2019-09-05 22:37:00
128.72.205.69 attack
Unauthorized connection attempt from IP address 128.72.205.69 on Port 445(SMB)
2019-09-05 22:26:11
203.76.221.26 attackbotsspam
Unauthorized connection attempt from IP address 203.76.221.26 on Port 445(SMB)
2019-09-05 22:02:45
35.189.237.181 attackspam
$f2bV_matches
2019-09-05 22:55:13
94.139.242.85 attack
Automatic report - Banned IP Access
2019-09-05 22:09:19
185.246.75.146 attackbots
Sep  5 08:52:14 raspberrypi sshd\[11073\]: Invalid user admin from 185.246.75.146Sep  5 08:52:17 raspberrypi sshd\[11073\]: Failed password for invalid user admin from 185.246.75.146 port 52544 ssh2Sep  5 09:06:38 raspberrypi sshd\[21616\]: Invalid user user01 from 185.246.75.146Sep  5 09:06:40 raspberrypi sshd\[21616\]: Failed password for invalid user user01 from 185.246.75.146 port 59778 ssh2Sep  5 09:12:32 raspberrypi sshd\[25956\]: Invalid user admin from 185.246.75.146Sep  5 09:12:35 raspberrypi sshd\[25956\]: Failed password for invalid user admin from 185.246.75.146 port 47336 ssh2Sep  5 09:18:08 raspberrypi sshd\[29910\]: Invalid user git from 185.246.75.146Sep  5 09:18:10 raspberrypi sshd\[29910\]: Failed password for invalid user git from 185.246.75.146 port 34878 ssh2Sep  5 09:23:35 raspberrypi sshd\[1460\]: Invalid user cactiuser from 185.246.75.146Sep  5 09:23:37 raspberrypi sshd\[1460\]: Failed password for invalid user cactiuser from 185.246.75.146 port 50628 ssh2Sep  5 09:29:11 raspberrypi ss
2019-09-05 22:41:37
209.85.214.174 attackbotsspam
Attempt to login to email server on SMTP service on 05-09-2019 12:13:07.
2019-09-05 22:23:07
209.85.221.170 attackbotsspam
Attempt to login to email server on SMTP service on 05-09-2019 09:45:42.
2019-09-05 22:11:16
209.85.214.171 attack
Attempt to login to email server on SMTP service on 05-09-2019 09:45:37.
2019-09-05 22:27:15
51.91.247.125 attackspam
Multiport scan : 4 ports scanned 4445 4643 8181 8881
2019-09-05 23:07:07

Recently Reported IPs

104.18.1.194 104.18.1.228 104.18.1.237 104.18.1.45
104.18.1.50 104.18.1.76 104.18.1.82 104.18.1.93
104.18.10.10 104.18.10.11 104.18.10.115 104.18.10.149
104.18.10.177 104.18.10.178 104.18.10.183 104.18.10.188
104.18.10.212 104.18.10.234 104.18.10.249 104.18.10.5