Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.14.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37198
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.14.49.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 17:38:23 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 49.14.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.14.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.22.98.171 attack
$f2bV_matches
2019-10-22 19:29:28
160.153.154.24 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-22 19:45:57
179.185.121.188 attack
port scan and connect, tcp 23 (telnet)
2019-10-22 20:00:01
71.6.158.166 attackbots
10/22/2019-13:53:40.308291 71.6.158.166 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2019-10-22 20:12:41
203.160.174.214 attack
Oct 22 13:27:53 meumeu sshd[9000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.174.214 
Oct 22 13:27:55 meumeu sshd[9000]: Failed password for invalid user zhanghua from 203.160.174.214 port 48646 ssh2
Oct 22 13:32:26 meumeu sshd[9634]: Failed password for root from 203.160.174.214 port 58802 ssh2
...
2019-10-22 19:35:17
114.40.169.253 attackbotsspam
UTC: 2019-10-21 port: 23/tcp
2019-10-22 19:37:36
109.110.52.77 attackspambots
Invalid user usuario from 109.110.52.77 port 42646
2019-10-22 20:06:48
61.246.226.112 attack
$f2bV_matches
2019-10-22 19:46:44
116.31.105.198 attackspambots
2019-10-22T09:08:00.593587hub.schaetter.us sshd\[31168\]: Invalid user a from 116.31.105.198 port 48562
2019-10-22T09:08:00.606382hub.schaetter.us sshd\[31168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.31.105.198
2019-10-22T09:08:02.489199hub.schaetter.us sshd\[31168\]: Failed password for invalid user a from 116.31.105.198 port 48562 ssh2
2019-10-22T09:12:59.056670hub.schaetter.us sshd\[31236\]: Invalid user Program2017 from 116.31.105.198 port 56002
2019-10-22T09:12:59.080952hub.schaetter.us sshd\[31236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.31.105.198
...
2019-10-22 19:49:46
94.255.186.30 attackspambots
Fail2Ban Ban Triggered
2019-10-22 20:11:46
52.166.95.124 attackbotsspam
Automatic report - Banned IP Access
2019-10-22 20:04:40
116.73.65.223 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 19:33:57
85.192.71.245 attackspambots
*Port Scan* detected from 85.192.71.245 (ES/Spain/ceip-agustibarbera-amposta.xtec.cat). 4 hits in the last 100 seconds
2019-10-22 19:51:26
111.251.192.8 attackbots
Honeypot attack, port: 23, PTR: 111-251-192-8.dynamic-ip.hinet.net.
2019-10-22 19:28:55
49.247.208.209 attack
" "
2019-10-22 19:31:57

Recently Reported IPs

104.18.14.234 104.18.14.54 104.18.14.71 104.18.14.8
104.18.14.80 104.18.14.87 104.18.14.93 104.18.140.15
104.18.140.211 104.18.140.63 0.98.226.178 104.18.140.86
104.18.141.211 104.18.141.26 104.18.141.5 104.18.141.63
224.144.196.124 104.18.141.72 104.18.141.86 104.18.142.211