Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.22.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.22.73.			IN	A

;; AUTHORITY SECTION:
.			417	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:49:57 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 73.22.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.22.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.4.39.144 attack
Automatic report - Banned IP Access
2019-07-18 11:09:20
91.201.170.184 attack
Jul 18 02:26:26 ms-srv sshd[19925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.201.170.184
Jul 18 02:26:27 ms-srv sshd[19925]: Failed password for invalid user admin from 91.201.170.184 port 40636 ssh2
2019-07-18 11:19:36
200.69.250.253 attack
Jul 18 05:14:36 vpn01 sshd\[16393\]: Invalid user kristin from 200.69.250.253
Jul 18 05:14:36 vpn01 sshd\[16393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.250.253
Jul 18 05:14:37 vpn01 sshd\[16393\]: Failed password for invalid user kristin from 200.69.250.253 port 44991 ssh2
2019-07-18 11:21:49
168.167.30.244 attackspam
Jul 18 04:38:44 dedicated sshd[3485]: Invalid user client from 168.167.30.244 port 55932
2019-07-18 10:55:16
139.59.56.121 attackbotsspam
Jul 18 02:25:56 debian sshd\[4650\]: Invalid user ident from 139.59.56.121 port 36134
Jul 18 02:25:56 debian sshd\[4650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.121
...
2019-07-18 11:30:44
171.244.9.46 attackbotsspam
2019-07-18T02:30:13.752067abusebot-7.cloudsearch.cf sshd\[18992\]: Invalid user roger from 171.244.9.46 port 53924
2019-07-18 10:58:44
95.90.214.32 attack
Chat Spam
2019-07-18 11:15:06
106.51.128.133 attackbots
Jul 18 04:29:50 h2177944 sshd\[32333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.128.133  user=root
Jul 18 04:29:52 h2177944 sshd\[32333\]: Failed password for root from 106.51.128.133 port 39556 ssh2
Jul 18 04:35:20 h2177944 sshd\[32604\]: Invalid user postgres from 106.51.128.133 port 38466
Jul 18 04:35:20 h2177944 sshd\[32604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.128.133
...
2019-07-18 11:37:35
195.206.105.217 attackbotsspam
Jul 18 03:27:23 giegler sshd[6956]: Failed password for root from 195.206.105.217 port 37276 ssh2
Jul 18 03:27:26 giegler sshd[6956]: Failed password for root from 195.206.105.217 port 37276 ssh2
Jul 18 03:27:29 giegler sshd[6956]: Failed password for root from 195.206.105.217 port 37276 ssh2
Jul 18 03:27:32 giegler sshd[6956]: Failed password for root from 195.206.105.217 port 37276 ssh2
Jul 18 03:27:35 giegler sshd[6956]: Failed password for root from 195.206.105.217 port 37276 ssh2
2019-07-18 10:56:21
138.36.1.182 attackbotsspam
Jul 17 12:01:06 our-server-hostname postfix/smtpd[16335]: connect from unknown[138.36.1.182]
Jul x@x
Jul x@x
Jul 17 12:01:09 our-server-hostname postfix/smtpd[16335]: NOQUEUE: reject: RCPT from unknown[
.... truncated .... 
17:56:00 x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul 17 17:56:03 our-server-hostname postfix/smtpd[30069]: too many errors after RCPT from unknown[138.36.1.182]
Jul 17 17:56:03 our-server-hostname postfix/smtpd[30069]: disconnect from unknown[138.36.1.182]
Jul 17 17:59:05 our-server-hostname postfix/smtpd[6498]: connect from unknown[138.36.1.182]
Jul x@x
Jul x@x
Jul 17 17:59:07 our-server-hostname postfix/smtpd[6498]: lost connection after RCPT from unknown[138.36.1.182]
Jul 17 17:59:07 our-server-hostname postfix/smtpd[6498]: disconnect from unknown[138.36.1.182]
Jul 17 18:06:15 our-server-hostname postfix/smtpd[11003]: connect from unknown[138.36.1.182]
Jul 17 18:06:17 our-server-hostname postfix/smtpd[10995]: connect from unknown[138.36.1.182]........
-------------------------------
2019-07-18 11:33:53
134.73.7.245 attackbotsspam
$f2bV_matches
2019-07-18 11:16:12
201.149.10.165 attack
Jul 18 07:52:55 areeb-Workstation sshd\[15894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.10.165  user=root
Jul 18 07:52:57 areeb-Workstation sshd\[15894\]: Failed password for root from 201.149.10.165 port 53008 ssh2
Jul 18 07:57:47 areeb-Workstation sshd\[16779\]: Invalid user kevin from 201.149.10.165
Jul 18 07:57:47 areeb-Workstation sshd\[16779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.10.165
...
2019-07-18 10:52:16
60.249.189.20 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-17 02:52:39,908 INFO [shellcode_manager] (60.249.189.20) no match, writing hexdump (5043bb83a98da9bc1b5487386f007fbf :2096174) - MS17010 (EternalBlue)
2019-07-18 11:24:34
36.237.109.104 attackspam
2019-07-17T10:40:45.122627stt-1.[munged] kernel: [7406064.618493] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=36.237.109.104 DST=[mungedIP1] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=18914 PROTO=TCP SPT=65436 DPT=37215 WINDOW=59271 RES=0x00 SYN URGP=0 
2019-07-17T14:40:03.482643stt-1.[munged] kernel: [7420422.935329] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=36.237.109.104 DST=[mungedIP1] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=20645 PROTO=TCP SPT=65436 DPT=37215 WINDOW=59271 RES=0x00 SYN URGP=0 
2019-07-17T21:26:28.627950stt-1.[munged] kernel: [7444807.999582] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=36.237.109.104 DST=[mungedIP1] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=64112 PROTO=TCP SPT=65436 DPT=37215 WINDOW=59271 RES=0x00 SYN URGP=0
2019-07-18 11:20:12
210.14.77.102 attack
Jul 18 03:36:57 www sshd\[21264\]: Invalid user jhonatan from 210.14.77.102 port 28979
...
2019-07-18 11:33:07

Recently Reported IPs

104.18.22.77 104.18.22.35 104.18.22.74 104.18.22.86
104.18.22.79 104.18.22.89 104.18.22.90 104.18.220.14
104.18.220.25 104.18.220.232 104.21.65.163 104.18.221.232
104.18.221.14 104.18.222.228 104.18.222.105 104.18.223.16
104.18.220.65 104.18.223.46 104.18.224.226 104.18.225.225