Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.19.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.19.100.			IN	A

;; AUTHORITY SECTION:
.			541	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 14:28:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 100.19.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.19.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.14.150.133 attackbots
2020-05-14T05:49:37.017431upcloud.m0sh1x2.com sshd[15761]: Invalid user setup from 45.14.150.133 port 33512
2020-05-14 16:50:36
106.12.69.53 attackspambots
(sshd) Failed SSH login from 106.12.69.53 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 14 06:57:59 srv sshd[6184]: Invalid user System from 106.12.69.53 port 58004
May 14 06:58:01 srv sshd[6184]: Failed password for invalid user System from 106.12.69.53 port 58004 ssh2
May 14 07:08:57 srv sshd[6426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.69.53  user=root
May 14 07:09:00 srv sshd[6426]: Failed password for root from 106.12.69.53 port 34422 ssh2
May 14 07:11:48 srv sshd[6473]: Invalid user martins from 106.12.69.53 port 43782
2020-05-14 16:15:42
58.210.82.250 attackbots
$f2bV_matches
2020-05-14 16:20:58
118.69.173.199 attackspambots
118.69.173.199 - - [14/May/2020:08:51:40 +0300] "POST /wp-login.php HTTP/1.1" 200 2202 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-14 16:32:14
80.211.135.26 attack
May 14 09:49:41 minden010 sshd[12313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.135.26
May 14 09:49:43 minden010 sshd[12313]: Failed password for invalid user jose from 80.211.135.26 port 54862 ssh2
May 14 09:54:01 minden010 sshd[14891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.135.26
...
2020-05-14 16:44:26
195.24.207.199 attack
Invalid user user from 195.24.207.199 port 39008
2020-05-14 16:45:51
61.164.34.78 attackspam
nft/Honeypot/22/73e86
2020-05-14 16:24:03
46.101.209.178 attackbots
Wordpress malicious attack:[sshd]
2020-05-14 16:59:49
191.34.162.186 attackspam
SSH brute-force: detected 25 distinct usernames within a 24-hour window.
2020-05-14 16:17:20
132.232.66.238 attackspambots
May 14 04:45:57 NPSTNNYC01T sshd[24974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.66.238
May 14 04:45:59 NPSTNNYC01T sshd[24974]: Failed password for invalid user db2yccm from 132.232.66.238 port 34844 ssh2
May 14 04:51:25 NPSTNNYC01T sshd[25393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.66.238
...
2020-05-14 16:56:01
222.186.175.151 attackspambots
May 14 10:44:38 eventyay sshd[9023]: Failed password for root from 222.186.175.151 port 8444 ssh2
May 14 10:44:51 eventyay sshd[9023]: Failed password for root from 222.186.175.151 port 8444 ssh2
May 14 10:44:51 eventyay sshd[9023]: error: maximum authentication attempts exceeded for root from 222.186.175.151 port 8444 ssh2 [preauth]
...
2020-05-14 16:53:06
45.55.180.7 attackbotsspam
2020-05-14T08:57:07.840240  sshd[6834]: Invalid user postgres from 45.55.180.7 port 59001
2020-05-14T08:57:07.851825  sshd[6834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.180.7
2020-05-14T08:57:07.840240  sshd[6834]: Invalid user postgres from 45.55.180.7 port 59001
2020-05-14T08:57:09.768216  sshd[6834]: Failed password for invalid user postgres from 45.55.180.7 port 59001 ssh2
...
2020-05-14 16:45:22
106.13.57.117 attack
$f2bV_matches
2020-05-14 16:56:23
36.79.253.210 attackspambots
Found by fail2ban
2020-05-14 16:16:38
213.238.181.133 attack
213.238.181.133 - - \[14/May/2020:05:49:11 +0200\] "POST /wp-login.php HTTP/1.0" 200 6718 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
213.238.181.133 - - \[14/May/2020:05:49:18 +0200\] "POST /wp-login.php HTTP/1.0" 200 6726 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
213.238.181.133 - - \[14/May/2020:05:49:25 +0200\] "POST /wp-login.php HTTP/1.0" 200 6714 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-05-14 16:28:36

Recently Reported IPs

104.18.189.66 83.165.24.30 104.18.19.111 104.18.19.115
104.18.19.125 104.18.19.135 104.18.19.136 104.18.19.143
104.18.19.144 104.18.19.15 104.18.19.150 104.18.19.156
104.18.19.158 145.92.190.109 104.18.19.163 104.18.19.170
104.18.19.185 104.18.19.190 104.18.19.192 104.18.19.196