Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.22.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.22.71.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 03:26:23 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 71.22.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.22.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
172.105.4.227 attackbotsspam
*Port Scan* detected from 172.105.4.227 (CA/Canada/protoscan.ampereinnotech.com). 11 hits in the last 145 seconds
2019-08-28 23:23:05
51.68.136.36 attackspam
Aug 28 16:20:22 ubuntu-2gb-nbg1-dc3-1 sshd[13626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.36
Aug 28 16:20:23 ubuntu-2gb-nbg1-dc3-1 sshd[13626]: Failed password for invalid user sysadmin from 51.68.136.36 port 49408 ssh2
...
2019-08-28 23:18:08
116.202.25.173 attack
CloudCIX Reconnaissance Scan Detected, PTR: static.173.25.202.116.clients.your-server.de.
2019-08-28 23:48:21
198.108.67.51 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-08-28 23:52:43
77.247.108.173 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-28 23:31:15
193.169.39.254 attackbots
Aug 28 11:14:20 TORMINT sshd\[18028\]: Invalid user ubuntu from 193.169.39.254
Aug 28 11:14:20 TORMINT sshd\[18028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.39.254
Aug 28 11:14:22 TORMINT sshd\[18028\]: Failed password for invalid user ubuntu from 193.169.39.254 port 34954 ssh2
...
2019-08-28 23:26:32
106.12.93.138 attackbotsspam
Aug 28 18:21:23 srv-4 sshd\[14638\]: Invalid user michel from 106.12.93.138
Aug 28 18:21:23 srv-4 sshd\[14638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.138
Aug 28 18:21:25 srv-4 sshd\[14638\]: Failed password for invalid user michel from 106.12.93.138 port 55110 ssh2
...
2019-08-29 00:00:15
49.206.9.44 attackspambots
firewall-block, port(s): 60001/tcp
2019-08-28 23:32:33
51.83.224.106 attackbots
[ 🇧🇷 ] From root@vft4.cbooplider.com Wed Aug 28 11:20:11 2019
 Received: from vft4.cbooplider.com ([51.83.224.106]:41276)
2019-08-28 23:44:33
118.179.87.6 attackbots
Aug 28 05:11:29 lcdev sshd\[13098\]: Invalid user kiran from 118.179.87.6
Aug 28 05:11:29 lcdev sshd\[13098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.disney-sourcing.com
Aug 28 05:11:30 lcdev sshd\[13098\]: Failed password for invalid user kiran from 118.179.87.6 port 37632 ssh2
Aug 28 05:16:29 lcdev sshd\[13547\]: Invalid user mice from 118.179.87.6
Aug 28 05:16:29 lcdev sshd\[13547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.disney-sourcing.com
2019-08-28 23:27:13
157.230.183.158 attack
2019-08-28T15:10:12.745855abusebot-8.cloudsearch.cf sshd\[6619\]: Invalid user oracle from 157.230.183.158 port 36530
2019-08-28 23:23:31
124.127.133.158 attackbotsspam
Automated report - ssh fail2ban:
Aug 28 17:25:00 authentication failure 
Aug 28 17:25:02 wrong password, user=guest, port=41342, ssh2
Aug 28 17:30:58 authentication failure
2019-08-29 00:07:39
82.165.124.116 attackspambots
2019-08-28T11:19:54.769233mizuno.rwx.ovh sshd[17579]: Connection from 82.165.124.116 port 47864 on 78.46.61.178 port 22
2019-08-28T11:19:54.922375mizuno.rwx.ovh sshd[17579]: Invalid user build from 82.165.124.116 port 47864
2019-08-28T11:19:54.927510mizuno.rwx.ovh sshd[17579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.124.116
2019-08-28T11:19:54.769233mizuno.rwx.ovh sshd[17579]: Connection from 82.165.124.116 port 47864 on 78.46.61.178 port 22
2019-08-28T11:19:54.922375mizuno.rwx.ovh sshd[17579]: Invalid user build from 82.165.124.116 port 47864
2019-08-28T11:19:57.079088mizuno.rwx.ovh sshd[17579]: Failed password for invalid user build from 82.165.124.116 port 47864 ssh2
...
2019-08-28 23:56:00
213.33.244.187 attackspambots
Aug 28 05:40:42 tdfoods sshd\[8734\]: Invalid user mouse from 213.33.244.187
Aug 28 05:40:42 tdfoods sshd\[8734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.33.244.187
Aug 28 05:40:44 tdfoods sshd\[8734\]: Failed password for invalid user mouse from 213.33.244.187 port 34472 ssh2
Aug 28 05:48:05 tdfoods sshd\[9306\]: Invalid user harrison from 213.33.244.187
Aug 28 05:48:05 tdfoods sshd\[9306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.33.244.187
2019-08-29 00:01:50
158.69.28.76 attack
[Wed Aug 28 22:10:05.129352 2019] [:error] [pid 5935:tid 139922209703680] [client 158.69.28.76:57032] [client 158.69.28.76] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "user-agent:" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/owasp-modsecurity-crs-3.1.1/rules/REQUEST-913-SCANNER-DETECTION.conf"] [line "56"] [id "913100"] [msg "Found User-Agent associated with security scanner"] [data "Matched Data: user-agent: found within REQUEST_HEADERS:User-Agent: user-agent:mozilla/4.0 (compatible; msie 6.0; windows nt 5.2; .net clr 1.0.3705"] [severity "CRITICAL"] [ver "OWASP_CRS/3.1.1"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-reputation-scanner"] [tag "OWASP_CRS/AUTOMATION/SECURITY_SCANNER"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XWaZTTd1aA0je1hLGnTsAgAAAAA"]
...
2019-08-28 23:59:04

Recently Reported IPs

104.18.22.59 104.18.22.94 104.18.222.56 142.115.55.49
104.18.222.99 104.18.223.56 104.18.225.13 104.18.226.13
104.18.228.44 146.144.67.66 104.18.229.44 104.18.23.121
1.238.149.229 104.18.23.146 104.18.23.185 104.18.23.210
104.18.23.224 104.18.23.225 13.140.122.48 104.18.23.38