Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.142.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34964
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.142.103.			IN	A

;; AUTHORITY SECTION:
.			33	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040102 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 23:06:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 103.142.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.142.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.155.26.79 attackbotsspam
Aug  5 20:37:04 onepixel sshd[2170428]: Failed password for root from 139.155.26.79 port 53454 ssh2
Aug  5 20:39:18 onepixel sshd[2171878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.79  user=root
Aug  5 20:39:19 onepixel sshd[2171878]: Failed password for root from 139.155.26.79 port 55544 ssh2
Aug  5 20:41:30 onepixel sshd[2173143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.79  user=root
Aug  5 20:41:32 onepixel sshd[2173143]: Failed password for root from 139.155.26.79 port 57636 ssh2
2020-08-06 04:49:10
36.226.102.221 attackbotsspam
1596629379 - 08/05/2020 14:09:39 Host: 36.226.102.221/36.226.102.221 Port: 445 TCP Blocked
2020-08-06 04:44:06
193.56.28.176 attack
2020-08-05 18:12:30 dovecot_login authenticator failed for \(User\) \[193.56.28.176\]: 535 Incorrect authentication data \(set_id=charlie@ift.org.ua\)2020-08-05 18:12:36 dovecot_login authenticator failed for \(User\) \[193.56.28.176\]: 535 Incorrect authentication data \(set_id=charlie@ift.org.ua\)2020-08-05 18:12:46 dovecot_login authenticator failed for \(User\) \[193.56.28.176\]: 535 Incorrect authentication data \(set_id=charlie@ift.org.ua\)
...
2020-08-06 04:38:07
61.177.172.168 attackspambots
$f2bV_matches
2020-08-06 05:05:50
106.54.3.250 attack
Aug  6 01:38:03 gw1 sshd[30734]: Failed password for root from 106.54.3.250 port 53850 ssh2
...
2020-08-06 04:57:46
112.85.42.188 attackbots
08/05/2020-17:17:00.642452 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-08-06 05:17:09
212.110.128.210 attackspam
Aug  5 22:30:58 vmd26974 sshd[2887]: Failed password for root from 212.110.128.210 port 52650 ssh2
...
2020-08-06 04:58:37
200.133.39.84 attackbotsspam
detected by Fail2Ban
2020-08-06 04:41:51
112.85.42.232 attack
Aug  5 22:41:23 abendstille sshd\[27835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Aug  5 22:41:23 abendstille sshd\[27837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Aug  5 22:41:25 abendstille sshd\[27835\]: Failed password for root from 112.85.42.232 port 59578 ssh2
Aug  5 22:41:25 abendstille sshd\[27837\]: Failed password for root from 112.85.42.232 port 20281 ssh2
Aug  5 22:41:27 abendstille sshd\[27835\]: Failed password for root from 112.85.42.232 port 59578 ssh2
Aug  5 22:41:27 abendstille sshd\[27837\]: Failed password for root from 112.85.42.232 port 20281 ssh2
...
2020-08-06 04:49:39
218.92.0.158 attackbotsspam
2020-08-05T20:59:01.872712vps1033 sshd[15301]: Failed password for root from 218.92.0.158 port 1712 ssh2
2020-08-05T20:59:05.180957vps1033 sshd[15301]: Failed password for root from 218.92.0.158 port 1712 ssh2
2020-08-05T20:59:13.284655vps1033 sshd[15301]: Failed password for root from 218.92.0.158 port 1712 ssh2
2020-08-05T20:59:16.436283vps1033 sshd[15301]: Failed password for root from 218.92.0.158 port 1712 ssh2
2020-08-05T20:59:19.339769vps1033 sshd[15301]: Failed password for root from 218.92.0.158 port 1712 ssh2
...
2020-08-06 05:14:45
218.92.0.219 attackbotsspam
Failed password for invalid user from 218.92.0.219 port 57682 ssh2
2020-08-06 05:04:40
212.64.5.28 attack
Aug  5 14:13:53 ip-172-31-62-245 sshd\[25267\]: Failed password for root from 212.64.5.28 port 55738 ssh2\
Aug  5 14:15:51 ip-172-31-62-245 sshd\[25290\]: Failed password for root from 212.64.5.28 port 47152 ssh2\
Aug  5 14:17:52 ip-172-31-62-245 sshd\[25322\]: Failed password for root from 212.64.5.28 port 38564 ssh2\
Aug  5 14:19:41 ip-172-31-62-245 sshd\[25363\]: Failed password for root from 212.64.5.28 port 58196 ssh2\
Aug  5 14:21:39 ip-172-31-62-245 sshd\[25386\]: Failed password for root from 212.64.5.28 port 49608 ssh2\
2020-08-06 04:41:31
192.144.239.87 attackbots
2020-08-05T20:34:31.102830abusebot-5.cloudsearch.cf sshd[23125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.239.87  user=root
2020-08-05T20:34:33.102488abusebot-5.cloudsearch.cf sshd[23125]: Failed password for root from 192.144.239.87 port 44664 ssh2
2020-08-05T20:36:39.683027abusebot-5.cloudsearch.cf sshd[23132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.239.87  user=root
2020-08-05T20:36:42.254691abusebot-5.cloudsearch.cf sshd[23132]: Failed password for root from 192.144.239.87 port 39600 ssh2
2020-08-05T20:38:49.094854abusebot-5.cloudsearch.cf sshd[23147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.239.87  user=root
2020-08-05T20:38:50.512456abusebot-5.cloudsearch.cf sshd[23147]: Failed password for root from 192.144.239.87 port 34536 ssh2
2020-08-05T20:40:58.539272abusebot-5.cloudsearch.cf sshd[23154]: pam_unix(sshd:auth):
...
2020-08-06 05:16:36
222.186.173.226 attackspam
Aug  5 22:52:23 jane sshd[20978]: Failed password for root from 222.186.173.226 port 44330 ssh2
Aug  5 22:52:28 jane sshd[20978]: Failed password for root from 222.186.173.226 port 44330 ssh2
...
2020-08-06 04:52:56
198.46.233.148 attackspam
Aug  5 20:48:22 django-0 sshd[25713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.233.148  user=root
Aug  5 20:48:24 django-0 sshd[25713]: Failed password for root from 198.46.233.148 port 55644 ssh2
...
2020-08-06 05:08:47

Recently Reported IPs

104.18.141.103 104.18.143.103 104.18.143.11 104.18.144.103
104.18.147.34 104.18.15.114 104.18.15.220 104.18.15.231
104.18.15.83 68.12.199.50 104.18.151.215 104.18.152.215
104.18.152.219 104.18.152.31 104.18.153.148 104.18.153.215
180.12.0.209 104.18.154.215 104.18.155.103 104.18.155.215