Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.127.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26631
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.127.18.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 05:18:10 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 18.127.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.127.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.171 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2020-02-15 18:47:28
107.158.93.205 attack
(From shonda.gabel@gmail.com) Hi there,
Do you use the computer for a long time working in your office or at home? If yes, then you must have often suffered from back pain and other health issues. Poor seat up while using the computer can reduce the circulation of blood to your muscles, bones, tendons, and ligaments, sometimes leading to stiffness and pain. If something is not done to correct the posture, it could lead to a severe adverse health situation. 
However, you can keep yourself safe by using quality posture corrector. See available posture correctors here: shoulderposture.com . You can correct the humpback and improve the correct posture. Quality posture corrector helps you relieve the pain in the shoulder and back. You need posture corrector if you use the computer for at least 3 to 4 hours a day. If not in no time, you will start to feel stiff neck or back pain. 
Follow this link: shoulderposture.com and check out qualities Brace Support Belt, Adjustable Back Posture Corrector, Clavicle, Spine,
2020-02-15 18:35:20
36.81.6.42 attackspambots
1581742160 - 02/15/2020 05:49:20 Host: 36.81.6.42/36.81.6.42 Port: 445 TCP Blocked
2020-02-15 18:43:41
139.59.135.84 attackspam
Feb 15 06:03:49 firewall sshd[23317]: Invalid user caleb from 139.59.135.84
Feb 15 06:03:51 firewall sshd[23317]: Failed password for invalid user caleb from 139.59.135.84 port 41796 ssh2
Feb 15 06:06:48 firewall sshd[23441]: Invalid user sudor from 139.59.135.84
...
2020-02-15 18:10:34
190.18.244.47 attackbots
Feb 15 05:42:04 xeon sshd[25604]: Failed password for invalid user celena from 190.18.244.47 port 42000 ssh2
2020-02-15 18:12:44
148.70.68.175 attackspam
Feb 15 10:21:18 ks10 sshd[529647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.68.175 
Feb 15 10:21:20 ks10 sshd[529647]: Failed password for invalid user mz from 148.70.68.175 port 52604 ssh2
...
2020-02-15 18:50:21
112.85.42.72 attack
Feb 15 09:57:25 zeus sshd[3089]: Failed password for root from 112.85.42.72 port 37052 ssh2
Feb 15 09:57:27 zeus sshd[3089]: Failed password for root from 112.85.42.72 port 37052 ssh2
Feb 15 09:57:31 zeus sshd[3089]: Failed password for root from 112.85.42.72 port 37052 ssh2
Feb 15 09:58:43 zeus sshd[3098]: Failed password for root from 112.85.42.72 port 18123 ssh2
2020-02-15 18:29:47
31.27.38.242 attackspambots
Feb 15 10:59:09 ns382633 sshd\[20193\]: Invalid user ta from 31.27.38.242 port 54778
Feb 15 10:59:09 ns382633 sshd\[20193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.27.38.242
Feb 15 10:59:11 ns382633 sshd\[20193\]: Failed password for invalid user ta from 31.27.38.242 port 54778 ssh2
Feb 15 11:22:42 ns382633 sshd\[24130\]: Invalid user postgres from 31.27.38.242 port 48192
Feb 15 11:22:42 ns382633 sshd\[24130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.27.38.242
2020-02-15 18:36:36
180.250.12.19 attackspam
Unauthorized connection attempt from IP address 180.250.12.19 on Port 445(SMB)
2020-02-15 18:30:15
58.215.13.154 attackbotsspam
Brute force attempt
2020-02-15 18:24:44
103.245.71.137 attack
1581742178 - 02/15/2020 05:49:38 Host: 103.245.71.137/103.245.71.137 Port: 445 TCP Blocked
2020-02-15 18:31:25
186.121.204.10 attack
Feb 15 06:20:28 firewall sshd[24080]: Invalid user aniruddha from 186.121.204.10
Feb 15 06:20:31 firewall sshd[24080]: Failed password for invalid user aniruddha from 186.121.204.10 port 47622 ssh2
Feb 15 06:24:01 firewall sshd[24252]: Invalid user www from 186.121.204.10
...
2020-02-15 18:13:49
37.49.231.163 attack
firewall-block, port(s): 5038/tcp, 50802/tcp
2020-02-15 18:16:12
111.246.87.230 attackbots
unauthorized connection attempt
2020-02-15 18:39:30
85.118.104.194 attackspambots
Feb 15 08:03:07 silence02 sshd[16238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.118.104.194
Feb 15 08:03:09 silence02 sshd[16238]: Failed password for invalid user fedor from 85.118.104.194 port 33986 ssh2
Feb 15 08:06:37 silence02 sshd[16428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.118.104.194
2020-02-15 18:38:20

Recently Reported IPs

104.18.126.77 104.18.128.18 104.18.13.12 104.18.13.124
104.18.13.126 104.18.13.130 104.18.13.138 199.20.97.154
104.18.13.149 104.18.13.153 104.18.13.154 104.18.13.168
104.18.13.181 104.18.13.190 104.18.13.194 104.18.13.20
104.18.13.205 104.18.13.208 104.18.13.213 104.18.13.221