Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.20.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13496
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.20.6.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 14:36:06 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 6.20.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.20.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.33.205.10 attackspambots
IMAP brute force
...
2019-11-19 23:19:58
186.24.33.29 attack
Unauthorized connection attempt from IP address 186.24.33.29 on Port 445(SMB)
2019-11-19 23:45:15
181.49.132.18 attackbotsspam
2019-11-19T08:55:09.306061ns547587 sshd\[15021\]: Invalid user jorden from 181.49.132.18 port 47530
2019-11-19T08:55:09.312575ns547587 sshd\[15021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.rsbpo.co
2019-11-19T08:55:11.543255ns547587 sshd\[15021\]: Failed password for invalid user jorden from 181.49.132.18 port 47530 ssh2
2019-11-19T08:59:48.565274ns547587 sshd\[15290\]: Invalid user kuehl from 181.49.132.18 port 55998
...
2019-11-19 23:30:40
222.252.94.108 attack
Nov 19 08:02:21 Tower sshd[12022]: Connection from 222.252.94.108 port 53432 on 192.168.10.220 port 22
Nov 19 08:02:23 Tower sshd[12022]: Invalid user 1 from 222.252.94.108 port 53432
Nov 19 08:02:23 Tower sshd[12022]: error: Could not get shadow information for NOUSER
Nov 19 08:02:23 Tower sshd[12022]: Failed password for invalid user 1 from 222.252.94.108 port 53432 ssh2
Nov 19 08:02:23 Tower sshd[12022]: Received disconnect from 222.252.94.108 port 53432:11: Bye Bye [preauth]
Nov 19 08:02:23 Tower sshd[12022]: Disconnected from invalid user 1 222.252.94.108 port 53432 [preauth]
2019-11-19 23:29:57
185.156.177.88 attack
Connection by 185.156.177.88 on port: 100 got caught by honeypot at 11/19/2019 1:27:44 PM
2019-11-19 23:34:56
82.205.60.216 attackspam
Unauthorized connection attempt from IP address 82.205.60.216 on Port 445(SMB)
2019-11-19 23:57:12
185.2.5.12 attackbots
SS5,WP GET /wp-login.php
GET /wp-login.php
2019-11-19 23:14:29
218.92.0.202 attackspam
Nov 19 16:05:17 MK-Soft-Root1 sshd[18413]: Failed password for root from 218.92.0.202 port 15388 ssh2
...
2019-11-19 23:34:30
187.158.132.18 attackbotsspam
Unauthorized connection attempt from IP address 187.158.132.18 on Port 445(SMB)
2019-11-19 23:53:17
165.227.115.93 attackspambots
Nov 19 14:44:10 lnxmail61 sshd[8235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.115.93
2019-11-19 23:35:32
92.118.160.5 attack
Fail2Ban Ban Triggered
2019-11-19 23:36:29
218.23.104.250 attackspam
Nov 19 15:48:29 server sshd\[12974\]: Invalid user admin from 218.23.104.250
Nov 19 15:48:29 server sshd\[12974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.23.104.250 
Nov 19 15:48:31 server sshd\[12974\]: Failed password for invalid user admin from 218.23.104.250 port 57002 ssh2
Nov 19 16:02:35 server sshd\[16571\]: Invalid user backup from 218.23.104.250
Nov 19 16:02:35 server sshd\[16571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.23.104.250 
...
2019-11-19 23:38:39
118.163.153.201 attackbotsspam
Unauthorized connection attempt from IP address 118.163.153.201 on Port 445(SMB)
2019-11-19 23:56:13
138.68.165.102 attack
Nov 19 09:16:13 linuxvps sshd\[50929\]: Invalid user lafay from 138.68.165.102
Nov 19 09:16:13 linuxvps sshd\[50929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.165.102
Nov 19 09:16:15 linuxvps sshd\[50929\]: Failed password for invalid user lafay from 138.68.165.102 port 34760 ssh2
Nov 19 09:20:19 linuxvps sshd\[53495\]: Invalid user server from 138.68.165.102
Nov 19 09:20:19 linuxvps sshd\[53495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.165.102
2019-11-19 23:32:11
185.156.73.3 attackbots
9278/tcp 9279/tcp 9277/tcp...
[2019-10-17/11-19]1762pkt,550pt.(tcp)
2019-11-19 23:22:35

Recently Reported IPs

104.18.20.51 171.171.47.9 104.18.20.65 104.18.20.69
104.18.20.71 104.18.20.74 104.18.20.76 104.18.20.78
104.18.20.87 104.18.201.97 104.18.202.79 104.18.203.4
104.18.204.4 104.18.205.12 104.18.206.12 104.18.208.70
104.18.209.70 104.18.21.100 104.18.21.104 104.18.21.119