Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.134.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.134.60.			IN	A

;; AUTHORITY SECTION:
.			213	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 17:36:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 60.134.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 60.134.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
220.136.15.45 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/220.136.15.45/ 
 TW - 1H : (2821)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 220.136.15.45 
 
 CIDR : 220.136.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 285 
  3H - 1109 
  6H - 2245 
 12H - 2723 
 24H - 2732 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 01:04:03
142.93.232.222 attack
Sep 23 06:48:59 friendsofhawaii sshd\[26726\]: Invalid user ax from 142.93.232.222
Sep 23 06:48:59 friendsofhawaii sshd\[26726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.222
Sep 23 06:49:01 friendsofhawaii sshd\[26726\]: Failed password for invalid user ax from 142.93.232.222 port 47088 ssh2
Sep 23 06:53:14 friendsofhawaii sshd\[27090\]: Invalid user nagios from 142.93.232.222
Sep 23 06:53:14 friendsofhawaii sshd\[27090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.222
2019-09-24 01:29:42
51.254.57.17 attackspam
Sep 23 13:55:38 vtv3 sshd\[8325\]: Invalid user yu from 51.254.57.17 port 58987
Sep 23 13:55:38 vtv3 sshd\[8325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.57.17
Sep 23 13:55:40 vtv3 sshd\[8325\]: Failed password for invalid user yu from 51.254.57.17 port 58987 ssh2
Sep 23 13:59:28 vtv3 sshd\[10048\]: Invalid user abcs from 51.254.57.17 port 51735
Sep 23 13:59:28 vtv3 sshd\[10048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.57.17
Sep 23 14:11:11 vtv3 sshd\[16425\]: Invalid user ye from 51.254.57.17 port 58228
Sep 23 14:11:11 vtv3 sshd\[16425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.57.17
Sep 23 14:11:13 vtv3 sshd\[16425\]: Failed password for invalid user ye from 51.254.57.17 port 58228 ssh2
Sep 23 14:15:11 vtv3 sshd\[18446\]: Invalid user admin from 51.254.57.17 port 50982
Sep 23 14:15:11 vtv3 sshd\[18446\]: pam_unix\(sshd:auth\): authent
2019-09-24 00:55:58
122.118.118.194 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/122.118.118.194/ 
 TW - 1H : (2993)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 122.118.118.194 
 
 CIDR : 122.118.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 302 
  3H - 1030 
  6H - 2189 
 12H - 2893 
 24H - 2902 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 01:21:27
112.85.42.180 attackspam
Sep 23 18:45:27 MK-Soft-Root1 sshd[3146]: Failed password for root from 112.85.42.180 port 55724 ssh2
Sep 23 18:45:32 MK-Soft-Root1 sshd[3146]: Failed password for root from 112.85.42.180 port 55724 ssh2
...
2019-09-24 01:28:30
45.82.153.38 attack
09/23/2019-12:15:48.112593 45.82.153.38 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 42
2019-09-24 00:51:02
138.197.180.102 attack
Sep 23 22:12:54 areeb-Workstation sshd[11926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102
Sep 23 22:12:56 areeb-Workstation sshd[11926]: Failed password for invalid user manfred from 138.197.180.102 port 59544 ssh2
...
2019-09-24 00:57:25
177.1.213.19 attackbots
Sep 23 10:20:44 home sshd[11779]: Invalid user miner-new from 177.1.213.19 port 36857
Sep 23 10:20:44 home sshd[11779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.213.19
Sep 23 10:20:44 home sshd[11779]: Invalid user miner-new from 177.1.213.19 port 36857
Sep 23 10:20:46 home sshd[11779]: Failed password for invalid user miner-new from 177.1.213.19 port 36857 ssh2
Sep 23 10:37:52 home sshd[11871]: Invalid user ubnt from 177.1.213.19 port 27542
Sep 23 10:37:52 home sshd[11871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.213.19
Sep 23 10:37:52 home sshd[11871]: Invalid user ubnt from 177.1.213.19 port 27542
Sep 23 10:37:53 home sshd[11871]: Failed password for invalid user ubnt from 177.1.213.19 port 27542 ssh2
Sep 23 10:43:11 home sshd[11908]: Invalid user wangzc from 177.1.213.19 port 45496
Sep 23 10:43:11 home sshd[11908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos
2019-09-24 01:01:06
23.94.205.209 attack
Sep 23 05:42:14 hiderm sshd\[21065\]: Invalid user p@Ssw0rd from 23.94.205.209
Sep 23 05:42:14 hiderm sshd\[21065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.205.209
Sep 23 05:42:16 hiderm sshd\[21065\]: Failed password for invalid user p@Ssw0rd from 23.94.205.209 port 56862 ssh2
Sep 23 05:46:14 hiderm sshd\[21388\]: Invalid user whirwind from 23.94.205.209
Sep 23 05:46:14 hiderm sshd\[21388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.205.209
2019-09-24 01:31:27
106.12.193.39 attack
Sep 23 18:44:13 markkoudstaal sshd[22017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.39
Sep 23 18:44:14 markkoudstaal sshd[22017]: Failed password for invalid user 123456789 from 106.12.193.39 port 48082 ssh2
Sep 23 18:49:19 markkoudstaal sshd[22437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.39
2019-09-24 00:55:34
138.197.199.249 attack
Sep 23 18:48:41 saschabauer sshd[18379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.199.249
Sep 23 18:48:43 saschabauer sshd[18379]: Failed password for invalid user m from 138.197.199.249 port 37275 ssh2
2019-09-24 00:50:48
51.38.144.159 attackspam
2019-09-23T12:24:58.2666591495-001 sshd\[63868\]: Invalid user cs from 51.38.144.159 port 46600
2019-09-23T12:24:58.2704711495-001 sshd\[63868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip159.ip-51-38-144.eu
2019-09-23T12:25:00.2923071495-001 sshd\[63868\]: Failed password for invalid user cs from 51.38.144.159 port 46600 ssh2
2019-09-23T12:29:26.4165171495-001 sshd\[64193\]: Invalid user administrator from 51.38.144.159 port 60458
2019-09-23T12:29:26.4234631495-001 sshd\[64193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip159.ip-51-38-144.eu
2019-09-23T12:29:28.8013721495-001 sshd\[64193\]: Failed password for invalid user administrator from 51.38.144.159 port 60458 ssh2
...
2019-09-24 00:48:28
170.130.66.171 attackbots
170.130.66.171 - - [23/Sep/2019:08:16:48 -0400] "GET /?page=products&action=view&manufacturerID=1&productID=/etc/passwd&linkID=3128 HTTP/1.1" 302 - "https://baldwinbrasshardware.com/?page=products&action=view&manufacturerID=1&productID=/etc/passwd&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-09-24 01:29:29
178.93.8.47 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/178.93.8.47/ 
 UA - 1H : (213)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : UA 
 NAME ASN : ASN6849 
 
 IP : 178.93.8.47 
 
 CIDR : 178.93.0.0/18 
 
 PREFIX COUNT : 1366 
 
 UNIQUE IP COUNT : 1315840 
 
 
 WYKRYTE ATAKI Z ASN6849 :  
  1H - 2 
  3H - 16 
  6H - 24 
 12H - 36 
 24H - 43 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 01:14:50
106.13.67.22 attack
2019-09-21 01:59:29 server sshd[55259]: Failed password for invalid user ubuntu from 106.13.67.22 port 50222 ssh2
2019-09-24 01:25:40

Recently Reported IPs

104.18.134.220 104.18.134.63 104.18.134.96 198.253.203.26
104.18.135.219 104.18.135.220 104.18.135.96 104.18.136.219
104.18.136.80 104.18.137.12 16.214.171.138 104.18.137.80
104.18.138.12 104.18.138.9 104.18.139.211 197.252.236.122
104.18.139.86 104.18.139.9 104.18.14.104 104.18.14.121