Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.234.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.234.150.			IN	A

;; AUTHORITY SECTION:
.			388	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:50:26 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 150.234.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.234.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
211.157.179.38 attack
Invalid user velarde from 211.157.179.38 port 38731
2020-07-12 21:49:11
222.122.202.149 attackspambots
2020-07-12T08:24:28.688667morrigan.ad5gb.com sshd[1250370]: Connection closed by 222.122.202.149 port 27413 [preauth]
2020-07-12T08:24:28.691425morrigan.ad5gb.com sshd[1250371]: Connection closed by 222.122.202.149 port 53941 [preauth]
2020-07-12 21:48:44
114.67.95.121 attackspambots
Invalid user sites from 114.67.95.121 port 34354
2020-07-12 22:11:06
122.51.214.35 attack
Invalid user shkim from 122.51.214.35 port 49932
2020-07-12 22:07:25
117.186.96.54 attack
2020-07-12T15:32:33.545560mail.standpoint.com.ua sshd[6927]: Invalid user sakanasi from 117.186.96.54 port 13689
2020-07-12T15:32:33.549083mail.standpoint.com.ua sshd[6927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.186.96.54
2020-07-12T15:32:33.545560mail.standpoint.com.ua sshd[6927]: Invalid user sakanasi from 117.186.96.54 port 13689
2020-07-12T15:32:36.112385mail.standpoint.com.ua sshd[6927]: Failed password for invalid user sakanasi from 117.186.96.54 port 13689 ssh2
2020-07-12T15:36:48.230989mail.standpoint.com.ua sshd[7595]: Invalid user hatton from 117.186.96.54 port 39303
...
2020-07-12 22:09:52
148.72.212.161 attack
(sshd) Failed SSH login from 148.72.212.161 (SG/Singapore/ip-148-72-212-161.ip.secureserver.net): 5 in the last 3600 secs
2020-07-12 22:01:47
167.99.131.243 attackbotsspam
Invalid user packer from 167.99.131.243 port 44962
2020-07-12 21:58:05
188.254.0.112 attackbots
Invalid user svn from 188.254.0.112 port 43956
2020-07-12 21:53:18
49.233.195.154 attackbotsspam
Invalid user developer from 49.233.195.154 port 48216
2020-07-12 21:43:21
139.59.57.39 attackbotsspam
Invalid user tanxjian from 139.59.57.39 port 60896
2020-07-12 22:04:35
153.127.19.213 attack
$f2bV_matches
2020-07-12 22:01:12
83.229.149.191 attack
Invalid user menglg from 83.229.149.191 port 56438
2020-07-12 22:16:46
139.186.15.254 attackbotsspam
Invalid user test from 139.186.15.254 port 57738
2020-07-12 22:04:16
34.77.127.43 attackspambots
Jul 12 15:37:02 serwer sshd\[616\]: Invalid user abbey from 34.77.127.43 port 49678
Jul 12 15:37:02 serwer sshd\[616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.77.127.43
Jul 12 15:37:04 serwer sshd\[616\]: Failed password for invalid user abbey from 34.77.127.43 port 49678 ssh2
...
2020-07-12 21:46:24
106.12.198.236 attackspambots
Invalid user cycle from 106.12.198.236 port 36282
2020-07-12 22:14:24

Recently Reported IPs

104.18.232.150 104.18.233.83 104.18.231.83 104.18.234.86
104.18.231.150 104.21.65.176 104.18.233.150 104.18.235.8
104.18.235.229 104.18.236.229 104.18.235.69 104.18.235.86
104.18.235.150 104.18.236.8 104.18.236.69 104.18.236.234
104.18.236.63 104.21.65.185 104.18.237.234 104.18.237.63