Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.22.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.22.107.			IN	A

;; AUTHORITY SECTION:
.			425	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:49:49 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 107.22.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.22.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.52.124 attack
Aug 11 16:49:22 TORMINT sshd\[17696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.124  user=root
Aug 11 16:49:25 TORMINT sshd\[17696\]: Failed password for root from 222.186.52.124 port 54824 ssh2
Aug 11 16:49:39 TORMINT sshd\[17704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.124  user=root
...
2019-08-12 04:50:15
185.220.101.69 attackspam
Syn flood / slowloris
2019-08-12 04:35:37
216.218.134.12 attackbotsspam
2,26-01/02 [bc01/m18] concatform PostRequest-Spammer scoring: Durban02
2019-08-12 05:13:48
94.176.9.217 attackbotsspam
Unauthorised access (Aug 11) SRC=94.176.9.217 LEN=40 PREC=0x20 TTL=235 ID=54627 DF TCP DPT=23 WINDOW=14600 SYN 
Unauthorised access (Aug 11) SRC=94.176.9.217 LEN=40 PREC=0x20 TTL=237 ID=53861 DF TCP DPT=23 WINDOW=14600 SYN 
Unauthorised access (Aug 11) SRC=94.176.9.217 LEN=40 PREC=0x20 TTL=235 ID=64835 DF TCP DPT=23 WINDOW=14600 SYN
2019-08-12 04:54:42
200.57.73.170 attackspam
Aug 11 12:11:52 mail postfix/smtpd\[21085\]: warning: unknown\[200.57.73.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 12:12:56 mail postfix/smtpd\[21085\]: warning: unknown\[200.57.73.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 12:13:01 mail postfix/smtpd\[21030\]: warning: unknown\[200.57.73.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-12 05:16:00
5.199.130.188 attack
Aug 11 21:56:31 vps sshd[21449]: Failed password for root from 5.199.130.188 port 43339 ssh2
Aug 11 21:56:33 vps sshd[21449]: Failed password for root from 5.199.130.188 port 43339 ssh2
Aug 11 21:56:36 vps sshd[21449]: Failed password for root from 5.199.130.188 port 43339 ssh2
Aug 11 21:56:40 vps sshd[21449]: Failed password for root from 5.199.130.188 port 43339 ssh2
...
2019-08-12 04:35:17
121.240.226.74 attack
Automated report - ssh fail2ban:
Aug 11 19:19:36 authentication failure 
Aug 11 19:19:38 wrong password, user=carly, port=24608, ssh2
2019-08-12 05:16:51
77.247.181.162 attackbots
2019-08-11T20:42:37.231190abusebot-3.cloudsearch.cf sshd\[28231\]: Invalid user user1 from 77.247.181.162 port 50598
2019-08-12 04:49:58
167.99.122.63 attackbotsspam
ZTE Router Exploit Scanner
2019-08-12 04:40:42
158.140.130.119 attack
2019-08-11T20:13:08.181852mail01 postfix/smtpd[11382]: warning: unknown[158.140.130.119]: SASL PLAIN authentication failed:
2019-08-11T20:13:14.121795mail01 postfix/smtpd[11382]: warning: unknown[158.140.130.119]: SASL PLAIN authentication failed:
2019-08-11T20:13:24.059918mail01 postfix/smtpd[11382]: warning: unknown[158.140.130.119]: SASL PLAIN authentication failed:
2019-08-12 04:36:07
198.199.113.209 attack
Aug 11 20:13:07 cvbmail sshd\[15949\]: Invalid user bbbbb from 198.199.113.209
Aug 11 20:13:07 cvbmail sshd\[15949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.113.209
Aug 11 20:13:09 cvbmail sshd\[15949\]: Failed password for invalid user bbbbb from 198.199.113.209 port 50364 ssh2
2019-08-12 04:41:31
96.230.109.108 attackbotsspam
Aug 11 13:27:21 cac1d2 sshd\[24692\]: Invalid user qhsupport from 96.230.109.108 port 60478
Aug 11 13:27:21 cac1d2 sshd\[24692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.230.109.108
Aug 11 13:27:23 cac1d2 sshd\[24692\]: Failed password for invalid user qhsupport from 96.230.109.108 port 60478 ssh2
...
2019-08-12 04:40:06
111.193.82.127 attackbotsspam
Aug 11 14:12:24 123flo sshd[47181]: Invalid user admin from 111.193.82.127
Aug 11 14:12:24 123flo sshd[47181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.193.82.127 
Aug 11 14:12:24 123flo sshd[47181]: Invalid user admin from 111.193.82.127
Aug 11 14:12:26 123flo sshd[47181]: Failed password for invalid user admin from 111.193.82.127 port 42792 ssh2
Aug 11 14:12:24 123flo sshd[47181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.193.82.127 
Aug 11 14:12:24 123flo sshd[47181]: Invalid user admin from 111.193.82.127
Aug 11 14:12:26 123flo sshd[47181]: Failed password for invalid user admin from 111.193.82.127 port 42792 ssh2
Aug 11 14:12:29 123flo sshd[47181]: Failed password for invalid user admin from 111.193.82.127 port 42792 ssh2
2019-08-12 04:57:10
156.204.166.0 attack
scan z
2019-08-12 04:53:50
60.170.180.96 attackspam
19/8/11@14:12:46: FAIL: IoT-Telnet address from=60.170.180.96
...
2019-08-12 04:50:33

Recently Reported IPs

104.18.219.25 104.18.22.112 104.18.22.12 104.18.22.127
104.18.22.157 104.18.22.150 104.18.22.15 104.18.22.125
104.18.22.13 104.18.22.161 104.18.22.134 104.18.22.171
104.18.22.20 104.21.65.161 104.18.22.208 104.18.22.207
104.18.22.209 104.18.22.223 104.18.22.242 104.18.22.23