Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.18.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.18.239.			IN	A

;; AUTHORITY SECTION:
.			332	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:47:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 239.18.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.18.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
84.201.162.151 attack
Jan 10 04:31:50 auw2 sshd\[20831\]: Invalid user ftpuser from 84.201.162.151
Jan 10 04:31:50 auw2 sshd\[20831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.162.151
Jan 10 04:31:52 auw2 sshd\[20831\]: Failed password for invalid user ftpuser from 84.201.162.151 port 43888 ssh2
Jan 10 04:33:45 auw2 sshd\[20978\]: Invalid user ubuntu from 84.201.162.151
Jan 10 04:33:45 auw2 sshd\[20978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.162.151
2020-01-10 23:22:27
104.248.29.180 attack
Invalid user buscador from 104.248.29.180 port 40596
2020-01-10 23:18:15
92.222.15.203 attackbotsspam
Jan 10 13:58:30 MK-Soft-Root1 sshd[2960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.15.203 
Jan 10 13:58:32 MK-Soft-Root1 sshd[2960]: Failed password for invalid user rgu from 92.222.15.203 port 54360 ssh2
...
2020-01-10 23:54:22
177.85.115.85 attackspambots
Invalid user admin from 177.85.115.85 port 40488
2020-01-10 23:41:14
103.40.235.215 attackspambots
invalid user
2020-01-10 23:20:11
104.200.134.250 attack
Invalid user admin from 104.200.134.250 port 48884
2020-01-10 23:18:38
211.75.194.80 attackspam
Jan 10 16:20:14 * sshd[7386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.194.80
Jan 10 16:20:16 * sshd[7386]: Failed password for invalid user setup from 211.75.194.80 port 37614 ssh2
2020-01-10 23:38:39
84.47.160.114 attackspam
Invalid user gmu from 84.47.160.114 port 43527
2020-01-10 23:49:12
54.37.204.154 attackbots
Invalid user mongo from 54.37.204.154 port 46516
2020-01-10 23:50:23
103.97.124.200 attackspambots
Invalid user lky from 103.97.124.200 port 54582
2020-01-10 23:19:45
67.55.92.89 attack
Invalid user mhlee from 67.55.92.89 port 58516
2020-01-10 23:49:57
192.207.205.98 attack
Invalid user celia from 192.207.205.98 port 8023
2020-01-10 23:39:30
118.25.195.244 attackbots
Invalid user cssserver from 118.25.195.244 port 49820
2020-01-10 23:44:32
5.135.164.168 attackspam
Invalid user tcn from 5.135.164.168 port 35980
2020-01-10 23:37:52
96.27.249.5 attackspam
Invalid user test from 96.27.249.5 port 38674
2020-01-10 23:21:16

Recently Reported IPs

104.18.18.221 104.18.18.26 156.238.132.94 104.18.18.42
104.18.18.32 104.18.18.28 104.21.65.115 104.18.18.46
104.18.18.44 104.18.18.48 104.18.18.47 104.18.18.51
104.18.18.60 104.18.18.50 104.18.18.73 104.18.18.93
104.18.18.79 104.18.180.16 104.18.18.58 104.18.18.83