Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.14.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.14.220.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040102 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 23:06:33 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 220.14.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.14.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.79.24.104 attackspam
Automatic report - Port Scan Attack
2020-02-25 05:46:34
202.100.50.174 attackbotsspam
Automatic report - Port Scan Attack
2020-02-25 05:47:49
222.186.175.215 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Failed password for root from 222.186.175.215 port 27146 ssh2
Failed password for root from 222.186.175.215 port 27146 ssh2
Failed password for root from 222.186.175.215 port 27146 ssh2
Failed password for root from 222.186.175.215 port 27146 ssh2
2020-02-25 05:31:07
78.229.23.68 attackspam
" "
2020-02-25 05:54:29
81.213.166.62 attack
Automatic report - Port Scan Attack
2020-02-25 05:52:00
201.242.53.213 attackspam
SMB 445 TCP - get your free FULL list of bad IP's @ plonkatronix.com
2020-02-25 05:42:18
45.141.84.91 attackbots
Repeated RDP login failures. Last user: administrator
2020-02-25 05:17:00
185.234.216.58 attackspambots
abuseConfidenceScore blocked for 12h
2020-02-25 05:55:39
103.98.115.145 attackspam
SIP/5060 Probe, BF, Hack -
2020-02-25 05:38:20
190.200.132.143 attack
Port probing on unauthorized port 445
2020-02-25 05:55:22
202.57.45.154 attackspam
1582550315 - 02/24/2020 14:18:35 Host: 202.57.45.154/202.57.45.154 Port: 445 TCP Blocked
2020-02-25 05:48:54
140.143.57.189 attackbotsspam
scan r
2020-02-25 05:54:05
128.199.133.249 attackbotsspam
Feb 24 21:57:09 silence02 sshd[22963]: Failed password for root from 128.199.133.249 port 41501 ssh2
Feb 24 22:00:58 silence02 sshd[24536]: Failed password for root from 128.199.133.249 port 54804 ssh2
Feb 24 22:04:47 silence02 sshd[26251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.249
2020-02-25 05:22:20
223.27.104.10 attack
Unauthorised access (Feb 24) SRC=223.27.104.10 LEN=40 TTL=241 ID=24989 TCP DPT=445 WINDOW=1024 SYN
2020-02-25 05:57:25
190.102.147.229 attackspam
Phishing spam from eperez@proviasdes.gob.pe
2020-02-25 05:29:39

Recently Reported IPs

104.18.14.114 104.18.140.103 104.18.141.103 104.18.142.103
104.18.143.103 104.18.143.11 104.18.144.103 104.18.147.34
104.18.15.114 104.18.15.220 104.18.15.231 104.18.15.83
68.12.199.50 104.18.151.215 104.18.152.215 104.18.152.219
104.18.152.31 104.18.153.148 104.18.153.215 180.12.0.209