Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.22.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.22.61.			IN	A

;; AUTHORITY SECTION:
.			382	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032200 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 23 03:07:20 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 61.22.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.22.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.195.2.158 attackspam
Caught in portsentry honeypot
2019-07-24 03:58:38
120.41.170.102 attackspambots
Brute force SMTP login attempts.
2019-07-24 04:21:28
13.95.237.210 attack
Automatic report - Banned IP Access
2019-07-24 04:08:42
185.86.164.99 attack
WordPress brute force
2019-07-24 04:05:13
51.77.146.136 attackbotsspam
Jul 23 21:35:20 * sshd[16736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.136
Jul 23 21:35:22 * sshd[16736]: Failed password for invalid user cai from 51.77.146.136 port 51202 ssh2
2019-07-24 03:42:10
112.186.77.102 attackbotsspam
Automatic report - Banned IP Access
2019-07-24 04:10:17
95.172.68.56 attackspam
ICMP MP Probe, Scan -
2019-07-24 04:14:32
93.186.135.244 attack
ICMP MP Probe, Scan -
2019-07-24 04:20:47
146.242.37.17 attackbotsspam
ICMP MP Probe, Scan -
2019-07-24 03:46:09
194.44.30.190 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 22:43:27,446 INFO [shellcode_manager] (194.44.30.190) no match, writing hexdump (04ff6ae21268c0525c2eef6a4f644152 :2129413) - MS17010 (EternalBlue)
2019-07-24 04:03:27
104.109.250.217 attack
ICMP MP Probe, Scan -
2019-07-24 04:08:08
36.92.22.26 attackbots
Unauthorized access to SSH at 23/Jul/2019:09:07:40 +0000.
2019-07-24 03:47:45
145.90.8.1 attack
ICMP MP Probe, Scan -
2019-07-24 03:59:45
157.230.30.23 attackbotsspam
Jul 23 16:47:06 yabzik sshd[6249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.30.23
Jul 23 16:47:08 yabzik sshd[6249]: Failed password for invalid user zhao from 157.230.30.23 port 47900 ssh2
Jul 23 16:53:35 yabzik sshd[8197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.30.23
2019-07-24 04:19:39
188.166.1.95 attackspam
2019-07-23T13:26:38.290568lon01.zurich-datacenter.net sshd\[5448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.1.95  user=root
2019-07-23T13:26:39.841026lon01.zurich-datacenter.net sshd\[5448\]: Failed password for root from 188.166.1.95 port 47678 ssh2
2019-07-23T13:34:56.538229lon01.zurich-datacenter.net sshd\[5585\]: Invalid user kong from 188.166.1.95 port 37548
2019-07-23T13:34:56.542765lon01.zurich-datacenter.net sshd\[5585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.1.95
2019-07-23T13:34:58.459430lon01.zurich-datacenter.net sshd\[5585\]: Failed password for invalid user kong from 188.166.1.95 port 37548 ssh2
...
2019-07-24 04:18:03

Recently Reported IPs

104.18.22.201 104.18.23.201 104.18.23.61 104.18.34.181
104.18.64.25 209.85.220.141 104.18.9.173 104.18.90.72
104.18.91.72 104.185.21.106 104.19.10.118 104.19.123.162
104.19.134.81 104.19.143.211 104.19.147.114 95.217.34.29
104.19.149.224 104.19.157.107 3.85.31.117 104.19.158.107