Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.136.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54184
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.136.86.			IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052602 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 27 07:41:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 86.136.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 86.136.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.53.199.232 attackbots
Jul 10 23:40:59 web1 postfix/smtpd[18046]: warning: unknown[191.53.199.232]: SASL PLAIN authentication failed: authentication failure
...
2019-07-11 21:09:20
128.204.191.78 attackbots
[portscan] Port scan
2019-07-11 21:14:45
36.37.203.28 attack
8080/tcp
[2019-07-11]1pkt
2019-07-11 20:37:22
114.40.111.117 attackspam
37215/tcp
[2019-07-11]1pkt
2019-07-11 20:41:11
46.21.209.123 attackbotsspam
Jul 11 05:23:26 rigel postfix/smtpd[24811]: connect from ip-46-21-209-123.nette.pl[46.21.209.123]
Jul 11 05:23:27 rigel postfix/smtpd[24811]: warning: ip-46-21-209-123.nette.pl[46.21.209.123]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 11 05:23:27 rigel postfix/smtpd[24811]: warning: ip-46-21-209-123.nette.pl[46.21.209.123]: SASL PLAIN authentication failed: authentication failure
Jul 11 05:23:27 rigel postfix/smtpd[24811]: warning: ip-46-21-209-123.nette.pl[46.21.209.123]: SASL LOGIN authentication failed: authentication failure
Jul 11 05:23:27 rigel postfix/smtpd[24811]: disconnect from ip-46-21-209-123.nette.pl[46.21.209.123]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.21.209.123
2019-07-11 20:24:39
193.188.22.38 attackbots
RDP Bruteforce
2019-07-11 21:05:55
183.154.170.16 attack
FTP/21 MH Probe, BF, Hack -
2019-07-11 21:08:24
219.248.137.8 attack
Invalid user ts3 from 219.248.137.8 port 41918
2019-07-11 20:46:58
164.163.99.10 attackspambots
Invalid user nagios from 164.163.99.10 port 59102
2019-07-11 20:22:04
131.196.93.248 attackbots
Jul 11 05:30:17 rigel postfix/smtpd[25318]: warning: hostname static-131-196-93-248.globaltelecombr.com.br does not resolve to address 131.196.93.248: Name or service not known
Jul 11 05:30:17 rigel postfix/smtpd[25318]: connect from unknown[131.196.93.248]
Jul 11 05:30:20 rigel postfix/smtpd[25318]: warning: unknown[131.196.93.248]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 11 05:30:21 rigel postfix/smtpd[25318]: warning: unknown[131.196.93.248]: SASL PLAIN authentication failed: authentication failure
Jul 11 05:30:22 rigel postfix/smtpd[25318]: warning: unknown[131.196.93.248]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=131.196.93.248
2019-07-11 20:51:42
175.162.156.177 attackspambots
23/tcp
[2019-07-11]1pkt
2019-07-11 20:55:43
85.195.222.234 attack
Jul 11 08:43:44 vtv3 sshd\[30304\]: Invalid user cheng from 85.195.222.234 port 42040
Jul 11 08:43:44 vtv3 sshd\[30304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.195.222.234
Jul 11 08:43:46 vtv3 sshd\[30304\]: Failed password for invalid user cheng from 85.195.222.234 port 42040 ssh2
Jul 11 08:44:05 vtv3 sshd\[30447\]: Invalid user shadow from 85.195.222.234 port 53070
Jul 11 08:44:05 vtv3 sshd\[30447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.195.222.234
2019-07-11 20:42:03
197.39.162.183 attack
23/tcp
[2019-07-11]1pkt
2019-07-11 20:22:27
111.242.3.26 attack
37215/tcp
[2019-07-11]1pkt
2019-07-11 20:22:56
188.166.121.132 attack
11.07.2019 12:06:28 SSH access blocked by firewall
2019-07-11 20:57:43

Recently Reported IPs

104.18.137.86 104.18.138.86 104.18.16.11 104.18.16.168
104.18.17.168 104.18.192.79 104.18.193.229 104.18.194.229
104.18.2.6 104.18.208.63 104.18.209.63 104.18.28.159
104.18.28.78 104.18.29.159 104.18.29.78 104.18.3.6
104.18.32.128 104.18.32.17 104.18.32.182 104.18.32.222