Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.20.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27189
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.20.7.			IN	A

;; AUTHORITY SECTION:
.			443	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022033100 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 31 16:41:25 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 7.20.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.20.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.67.206.186 attackspam
SSH brutforce
2020-06-13 03:53:06
182.23.81.86 attackspam
Unauthorized connection attempt from IP address 182.23.81.86 on Port 445(SMB)
2020-06-13 04:07:40
187.76.183.130 attack
Unauthorized connection attempt from IP address 187.76.183.130 on Port 445(SMB)
2020-06-13 03:52:18
77.237.87.208 attack
Unauthorized connection attempt from IP address 77.237.87.208 on Port 445(SMB)
2020-06-13 04:00:25
89.218.178.190 attack
Unauthorized connection attempt from IP address 89.218.178.190 on Port 445(SMB)
2020-06-13 03:57:47
222.186.173.201 attack
2020-06-12T22:53:41.382255lavrinenko.info sshd[24705]: Failed password for root from 222.186.173.201 port 49934 ssh2
2020-06-12T22:53:46.302530lavrinenko.info sshd[24705]: Failed password for root from 222.186.173.201 port 49934 ssh2
2020-06-12T22:53:51.370514lavrinenko.info sshd[24705]: Failed password for root from 222.186.173.201 port 49934 ssh2
2020-06-12T22:53:55.761587lavrinenko.info sshd[24705]: Failed password for root from 222.186.173.201 port 49934 ssh2
2020-06-12T22:54:00.157615lavrinenko.info sshd[24705]: Failed password for root from 222.186.173.201 port 49934 ssh2
...
2020-06-13 04:10:53
103.68.35.150 attack
Unauthorized connection attempt from IP address 103.68.35.150 on Port 445(SMB)
2020-06-13 04:02:42
91.106.193.72 attackspambots
Jun 12 21:23:50 lnxmail61 sshd[31924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.106.193.72
2020-06-13 04:06:48
182.61.105.127 attackspambots
SSH Honeypot -> SSH Bruteforce / Login
2020-06-13 03:52:47
109.123.117.237 attackbotsspam
 TCP (SYN) 109.123.117.237:8080 -> port 8080, len 44
2020-06-13 03:54:32
178.62.33.138 attackbots
Jun 12 21:19:57 h1745522 sshd[9923]: Invalid user tpu from 178.62.33.138 port 60746
Jun 12 21:19:57 h1745522 sshd[9923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.138
Jun 12 21:19:57 h1745522 sshd[9923]: Invalid user tpu from 178.62.33.138 port 60746
Jun 12 21:19:58 h1745522 sshd[9923]: Failed password for invalid user tpu from 178.62.33.138 port 60746 ssh2
Jun 12 21:23:15 h1745522 sshd[10066]: Invalid user ubuntu from 178.62.33.138 port 33546
Jun 12 21:23:15 h1745522 sshd[10066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.138
Jun 12 21:23:15 h1745522 sshd[10066]: Invalid user ubuntu from 178.62.33.138 port 33546
Jun 12 21:23:17 h1745522 sshd[10066]: Failed password for invalid user ubuntu from 178.62.33.138 port 33546 ssh2
Jun 12 21:26:29 h1745522 sshd[10190]: Invalid user superpipes from 178.62.33.138 port 34580
...
2020-06-13 03:45:44
190.129.2.42 attackspambots
Unauthorized connection attempt from IP address 190.129.2.42 on Port 445(SMB)
2020-06-13 03:49:46
112.85.42.176 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Failed password for root from 112.85.42.176 port 2105 ssh2
Failed password for root from 112.85.42.176 port 2105 ssh2
Failed password for root from 112.85.42.176 port 2105 ssh2
Failed password for root from 112.85.42.176 port 2105 ssh2
2020-06-13 04:04:40
79.137.74.57 attack
" "
2020-06-13 04:04:56
93.95.240.245 attackspam
$f2bV_matches
2020-06-13 04:03:01

Recently Reported IPs

104.18.20.246 104.18.207.4 104.18.21.246 104.18.21.7
104.18.213.116 104.18.22.3 104.18.224.35 104.18.225.35
104.18.225.70 104.18.226.32 104.18.227.32 104.18.23.3
104.18.235.18 104.18.240.70 104.18.242.241 104.18.245.23
104.18.245.48 104.18.246.23 24.80.141.186 104.18.246.71