Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.159.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8425
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.159.11.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040702 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 08 02:26:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 11.159.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.159.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.14.99.14 attackbots
Apr 23 19:56:01 firewall sshd[26834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.14.99.14
Apr 23 19:56:01 firewall sshd[26834]: Invalid user ftpuser from 80.14.99.14
Apr 23 19:56:03 firewall sshd[26834]: Failed password for invalid user ftpuser from 80.14.99.14 port 49207 ssh2
...
2020-04-24 07:24:16
51.83.33.156 attackspam
Invalid user testadmin from 51.83.33.156 port 34128
2020-04-24 07:43:30
111.231.66.135 attack
Invalid user ky from 111.231.66.135 port 44150
2020-04-24 07:27:53
222.186.52.78 attackbots
Apr 24 00:47:22 * sshd[25821]: Failed password for root from 222.186.52.78 port 11339 ssh2
2020-04-24 07:22:04
162.243.129.209 attackbotsspam
Apr 23 17:07:44 : SSH login attempts with invalid user
2020-04-24 07:20:31
13.78.236.55 attackbotsspam
2020-04-23T17:20:45Z - RDP login failed multiple times. (13.78.236.55)
2020-04-24 07:31:46
85.187.218.189 attackspambots
Port scan(s) denied
2020-04-24 07:22:45
13.90.200.181 attack
Repeated RDP login failures. Last user: administrator
2020-04-24 07:51:03
202.147.198.154 attackspambots
SSH Invalid Login
2020-04-24 07:41:20
104.140.188.34 attackspam
Port scan: Attack repeated for 24 hours
2020-04-24 07:30:38
40.117.61.218 attackbots
Repeated RDP login failures. Last user: administrator
2020-04-24 07:43:57
137.117.245.201 attack
Repeated RDP login failures. Last user: administrator
2020-04-24 07:52:26
134.122.29.245 attackbots
Invalid user oracle from 134.122.29.245 port 35306
2020-04-24 07:48:30
136.49.109.217 attack
Invalid user admin123 from 136.49.109.217 port 50546
2020-04-24 07:39:18
167.249.11.57 attack
Invalid user wb from 167.249.11.57 port 45042
2020-04-24 07:29:05

Recently Reported IPs

104.18.156.22 104.18.159.253 104.18.16.101 104.18.16.77
104.18.17.77 104.18.171.237 104.18.172.237 104.18.174.100
104.18.182.4 104.18.197.63 104.18.198.63 104.18.217.85
104.18.218.85 104.18.22.228 104.18.23.228 104.18.235.62
104.18.236.236 104.18.236.62 104.18.237.236 104.18.36.80