Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.142.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.142.211.			IN	A

;; AUTHORITY SECTION:
.			374	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 17:39:49 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 211.142.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 211.142.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.234.6.145 attackbots
Apr 28 10:22:00 prox sshd[10230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.6.145 
Apr 28 10:22:02 prox sshd[10230]: Failed password for invalid user connect from 62.234.6.145 port 49602 ssh2
2020-04-28 17:04:16
106.12.58.4 attackspambots
ssh brute force
2020-04-28 16:36:04
13.67.211.29 attack
detected by Fail2Ban
2020-04-28 17:00:10
106.12.168.83 attackspambots
Invalid user veeam from 106.12.168.83 port 51578
2020-04-28 16:44:18
211.108.168.106 attackbots
Apr 28 06:57:18 ws26vmsma01 sshd[125737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.108.168.106
Apr 28 06:57:20 ws26vmsma01 sshd[125737]: Failed password for invalid user chris from 211.108.168.106 port 36026 ssh2
...
2020-04-28 16:51:07
110.43.128.103 attackbotsspam
$f2bV_matches
2020-04-28 16:35:09
51.159.52.209 attackbots
2020-04-28T04:52:10.089832shield sshd\[8903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.159.52.209  user=root
2020-04-28T04:52:12.020922shield sshd\[8903\]: Failed password for root from 51.159.52.209 port 60598 ssh2
2020-04-28T04:57:48.587260shield sshd\[10134\]: Invalid user cristobal from 51.159.52.209 port 44148
2020-04-28T04:57:48.590119shield sshd\[10134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.159.52.209
2020-04-28T04:57:50.591098shield sshd\[10134\]: Failed password for invalid user cristobal from 51.159.52.209 port 44148 ssh2
2020-04-28 16:20:02
51.178.50.119 attackbotsspam
SSH Brute-Forcing (server1)
2020-04-28 16:37:19
89.40.120.160 attackspambots
Apr 27 23:06:55 server1 sshd\[13637\]: Failed password for root from 89.40.120.160 port 52912 ssh2
Apr 27 23:10:47 server1 sshd\[15007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.40.120.160  user=root
Apr 27 23:10:49 server1 sshd\[15007\]: Failed password for root from 89.40.120.160 port 34316 ssh2
Apr 27 23:14:38 server1 sshd\[16224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.40.120.160  user=root
Apr 27 23:14:40 server1 sshd\[16224\]: Failed password for root from 89.40.120.160 port 43950 ssh2
...
2020-04-28 16:23:14
196.189.91.162 attackbotsspam
Apr 28 10:20:48 srv01 sshd[16695]: Did not receive identification string from 196.189.91.162 port 41840
Apr 28 10:23:11 srv01 sshd[16878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.91.162  user=root
Apr 28 10:23:13 srv01 sshd[16878]: Failed password for root from 196.189.91.162 port 58692 ssh2
...
2020-04-28 16:54:53
92.118.37.95 attackspambots
[MK-Root1] Blocked by UFW
2020-04-28 16:40:15
185.220.101.175 attackbotsspam
(From antoniafq16@hikaru66.gomailxyz.space) Hot teen pics
http://lgbtissues.allproblog.com/?natasha 

 best free porn downlaods flashing fanny porn videos demon girl porn stop porn now simpsons hentai porns
2020-04-28 16:27:20
218.92.0.171 attackspambots
Apr 28 10:26:49 sso sshd[28894]: Failed password for root from 218.92.0.171 port 42057 ssh2
Apr 28 10:26:58 sso sshd[28894]: Failed password for root from 218.92.0.171 port 42057 ssh2
...
2020-04-28 16:36:47
106.12.197.212 attackbotsspam
5725/tcp
[2020-04-28]1pkt
2020-04-28 16:52:25
62.171.184.27 attack
Apr 28 10:51:15 tor-proxy-02 sshd\[11944\]: User root from 62.171.184.27 not allowed because not listed in AllowUsers
Apr 28 10:51:49 tor-proxy-02 sshd\[11946\]: User root from 62.171.184.27 not allowed because not listed in AllowUsers
Apr 28 10:52:17 tor-proxy-02 sshd\[11948\]: User root from 62.171.184.27 not allowed because not listed in AllowUsers
...
2020-04-28 17:03:15

Recently Reported IPs

104.18.141.86 104.18.142.26 104.18.142.5 104.18.142.86
104.18.143.211 104.18.143.86 104.18.144.11 104.18.144.17
104.18.144.53 104.18.144.91 104.18.144.96 104.18.145.11
100.169.20.45 104.18.145.17 104.18.145.54 104.18.145.91
104.18.146.232 104.18.146.54 104.18.147.232 104.18.147.58