Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.199.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54682
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.199.54.			IN	A

;; AUTHORITY SECTION:
.			313	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031100 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 11 18:36:36 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 54.199.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.199.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.65.183.5 attackbotsspam
(mod_security) mod_security (id:232380) triggered by 40.65.183.5 (SG/Singapore/-): 5 in the last 300 secs
2020-08-21 02:02:06
196.194.205.51 attackbotsspam
Unauthorized connection attempt from IP address 196.194.205.51 on Port 445(SMB)
2020-08-21 01:41:30
79.143.42.255 attack
Unauthorized connection attempt from IP address 79.143.42.255 on Port 445(SMB)
2020-08-21 01:52:12
113.89.12.21 attack
Aug 20 13:16:21 Tower sshd[18910]: Connection from 113.89.12.21 port 40442 on 192.168.10.220 port 22 rdomain ""
Aug 20 13:16:25 Tower sshd[18910]: Failed password for root from 113.89.12.21 port 40442 ssh2
Aug 20 13:16:26 Tower sshd[18910]: Received disconnect from 113.89.12.21 port 40442:11: Bye Bye [preauth]
Aug 20 13:16:26 Tower sshd[18910]: Disconnected from authenticating user root 113.89.12.21 port 40442 [preauth]
2020-08-21 01:33:47
190.192.40.18 attackspambots
Aug 20 16:50:48 rush sshd[30856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.192.40.18
Aug 20 16:50:50 rush sshd[30856]: Failed password for invalid user user from 190.192.40.18 port 57444 ssh2
Aug 20 16:53:27 rush sshd[30972]: Failed password for root from 190.192.40.18 port 59268 ssh2
...
2020-08-21 01:35:16
216.30.159.122 attack
Unauthorized connection attempt from IP address 216.30.159.122 on Port 445(SMB)
2020-08-21 01:59:54
46.83.36.173 attackbots
Aug 20 19:21:58 minden010 postfix/smtpd[8741]: NOQUEUE: reject: RCPT from p2e5324ad.dip0.t-ipconnect.de[46.83.36.173]: 450 4.7.1 : Helo command rejected: Host not found; from=<> to= proto=ESMTP helo=
Aug 20 19:21:58 minden010 postfix/smtpd[4649]: NOQUEUE: reject: RCPT from p2e5324ad.dip0.t-ipconnect.de[46.83.36.173]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Aug 20 19:22:00 minden010 postfix/smtpd[3865]: NOQUEUE: reject: RCPT from p2e5324ad.dip0.t-ipconnect.de[46.83.36.173]: 450 4.7.1 : Helo command rejected: Host not found; from=<> to= proto=ESMTP helo=
Aug 20 19:26:57 minden010 postfix/smtpd[3865]: NOQUEUE: reject: RCPT from p2e5324ad.dip0.t-ipconnect.de[46.83.36.173]: 450 4.7.1 : Helo command rejected: Host not found; from=<> to= proto=ESMTP helo=
Aug 20
...
2020-08-21 01:46:03
140.207.96.235 attackbots
Aug 20 20:30:58 ift sshd\[25067\]: Invalid user info from 140.207.96.235Aug 20 20:31:01 ift sshd\[25067\]: Failed password for invalid user info from 140.207.96.235 port 46228 ssh2Aug 20 20:35:01 ift sshd\[25527\]: Invalid user admwizzbe from 140.207.96.235Aug 20 20:35:03 ift sshd\[25527\]: Failed password for invalid user admwizzbe from 140.207.96.235 port 44374 ssh2Aug 20 20:38:52 ift sshd\[26204\]: Invalid user lg from 140.207.96.235
...
2020-08-21 01:39:25
77.245.2.250 attackbots
Unauthorized connection attempt from IP address 77.245.2.250 on Port 445(SMB)
2020-08-21 02:07:31
128.199.169.90 attack
Invalid user student5 from 128.199.169.90 port 59142
2020-08-21 02:00:44
93.81.220.122 attack
Unauthorized connection attempt from IP address 93.81.220.122 on Port 445(SMB)
2020-08-21 01:57:33
200.6.251.100 attack
2020-08-20T14:22:43.236467shield sshd\[4430\]: Invalid user jimmy from 200.6.251.100 port 52840
2020-08-20T14:22:43.248509shield sshd\[4430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.6.251.100
2020-08-20T14:22:44.976743shield sshd\[4430\]: Failed password for invalid user jimmy from 200.6.251.100 port 52840 ssh2
2020-08-20T14:27:18.294707shield sshd\[4790\]: Invalid user owner from 200.6.251.100 port 45186
2020-08-20T14:27:18.302832shield sshd\[4790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.6.251.100
2020-08-21 01:34:16
176.41.233.223 attack
Unauthorized connection attempt from IP address 176.41.233.223 on Port 445(SMB)
2020-08-21 01:52:33
217.151.77.62 attack
Unauthorized connection attempt from IP address 217.151.77.62 on Port 445(SMB)
2020-08-21 02:08:16
180.117.113.88 attackspambots
Aug 20 14:59:57 server2 sshd\[9761\]: Invalid user pi from 180.117.113.88
Aug 20 15:00:25 server2 sshd\[9780\]: Invalid user pi from 180.117.113.88
Aug 20 15:00:52 server2 sshd\[9983\]: Invalid user pi from 180.117.113.88
Aug 20 15:01:15 server2 sshd\[9996\]: Invalid user osboxes from 180.117.113.88
Aug 20 15:01:37 server2 sshd\[10056\]: Invalid user openhabian from 180.117.113.88
Aug 20 15:02:05 server2 sshd\[10067\]: Invalid user NetLinx from 180.117.113.88
2020-08-21 02:06:52

Recently Reported IPs

104.18.198.54 104.18.199.89 104.18.2.101 104.18.2.193
104.18.2.203 104.18.2.215 104.18.2.226 104.18.2.231
104.18.2.70 104.18.20.181 104.18.20.233 104.18.20.241
104.18.20.56 104.18.20.77 104.18.200.89 104.18.205.233
104.18.208.218 104.18.209.218 104.18.21.181 104.18.21.241