Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.235.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46719
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.235.18.			IN	A

;; AUTHORITY SECTION:
.			472	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022033100 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 31 16:42:10 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 18.235.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.235.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.1.23 attackspambots
Aug  9 16:52:42 PorscheCustomer sshd[29999]: Failed password for root from 49.235.1.23 port 52146 ssh2
Aug  9 16:55:26 PorscheCustomer sshd[30050]: Failed password for root from 49.235.1.23 port 48828 ssh2
...
2020-08-09 22:59:57
206.189.47.166 attackspam
2020-08-09T08:12:48.314883sorsha.thespaminator.com sshd[32527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166  user=root
2020-08-09T08:12:49.889587sorsha.thespaminator.com sshd[32527]: Failed password for root from 206.189.47.166 port 33508 ssh2
...
2020-08-09 22:45:14
144.217.95.97 attackspam
Aug  9 16:02:39 server sshd[37811]: Failed password for root from 144.217.95.97 port 59614 ssh2
Aug  9 16:07:35 server sshd[39411]: Failed password for root from 144.217.95.97 port 46586 ssh2
Aug  9 16:12:07 server sshd[40807]: Failed password for root from 144.217.95.97 port 57900 ssh2
2020-08-09 22:36:20
91.191.209.47 attackspambots
2020-08-09T16:09:51.037243beta postfix/smtpd[13939]: warning: unknown[91.191.209.47]: SASL LOGIN authentication failed: authentication failure
2020-08-09T16:10:34.007302beta postfix/smtpd[13966]: warning: unknown[91.191.209.47]: SASL LOGIN authentication failed: authentication failure
2020-08-09T16:11:13.906428beta postfix/smtpd[13962]: warning: unknown[91.191.209.47]: SASL LOGIN authentication failed: authentication failure
...
2020-08-09 23:13:05
222.186.175.183 attackspambots
Aug  9 10:55:08 NPSTNNYC01T sshd[22255]: Failed password for root from 222.186.175.183 port 47706 ssh2
Aug  9 10:55:20 NPSTNNYC01T sshd[22255]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 47706 ssh2 [preauth]
Aug  9 10:55:25 NPSTNNYC01T sshd[22300]: Failed password for root from 222.186.175.183 port 38068 ssh2
...
2020-08-09 23:18:25
218.92.0.148 attack
Aug  9 16:42:17 abendstille sshd\[4703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Aug  9 16:42:19 abendstille sshd\[4703\]: Failed password for root from 218.92.0.148 port 17788 ssh2
Aug  9 16:42:29 abendstille sshd\[5070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Aug  9 16:42:31 abendstille sshd\[5070\]: Failed password for root from 218.92.0.148 port 56219 ssh2
Aug  9 16:42:33 abendstille sshd\[5070\]: Failed password for root from 218.92.0.148 port 56219 ssh2
...
2020-08-09 22:48:51
222.186.175.154 attackbots
Aug  9 17:13:04 vps sshd[127585]: Failed password for root from 222.186.175.154 port 42336 ssh2
Aug  9 17:13:06 vps sshd[127585]: Failed password for root from 222.186.175.154 port 42336 ssh2
Aug  9 17:13:10 vps sshd[127585]: Failed password for root from 222.186.175.154 port 42336 ssh2
Aug  9 17:13:13 vps sshd[127585]: Failed password for root from 222.186.175.154 port 42336 ssh2
Aug  9 17:13:17 vps sshd[127585]: Failed password for root from 222.186.175.154 port 42336 ssh2
...
2020-08-09 23:15:41
34.93.218.177 attackspam
2020-08-09T14:02:42.487837shield sshd\[7142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.218.93.34.bc.googleusercontent.com  user=root
2020-08-09T14:02:44.648301shield sshd\[7142\]: Failed password for root from 34.93.218.177 port 36456 ssh2
2020-08-09T14:07:26.630442shield sshd\[7494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.218.93.34.bc.googleusercontent.com  user=root
2020-08-09T14:07:28.444461shield sshd\[7494\]: Failed password for root from 34.93.218.177 port 36460 ssh2
2020-08-09T14:12:17.701398shield sshd\[7904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.218.93.34.bc.googleusercontent.com  user=root
2020-08-09 22:36:54
87.251.74.223 attack
 TCP (SYN) 87.251.74.223:56923 -> port 40004, len 44
2020-08-09 22:54:20
180.66.207.67 attackspambots
Aug  9 15:04:46 ajax sshd[9225]: Failed password for root from 180.66.207.67 port 44979 ssh2
2020-08-09 22:55:48
35.227.108.34 attackbots
35.227.108.34 (US/United States/34.108.227.35.bc.googleusercontent.com), 12 distributed sshd attacks on account [root] in the last 3600 secs
2020-08-09 23:01:27
121.190.28.5 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-09 22:32:59
194.180.224.130 attackspambots
Aug  9 11:06:01 Tower sshd[1964]: Connection from 194.180.224.130 port 56644 on 192.168.10.220 port 22 rdomain ""
Aug  9 11:06:02 Tower sshd[1964]: Failed password for root from 194.180.224.130 port 56644 ssh2
Aug  9 11:06:02 Tower sshd[1964]: Connection closed by authenticating user root 194.180.224.130 port 56644 [preauth]
2020-08-09 23:17:27
117.50.63.241 attackspambots
Bruteforce detected by fail2ban
2020-08-09 23:08:49
185.86.164.99 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-08-09 23:07:53

Recently Reported IPs

104.18.23.3 104.18.240.70 104.18.242.241 104.18.245.23
104.18.245.48 104.18.246.23 24.80.141.186 104.18.246.71
104.18.252.106 104.18.252.37 104.18.28.48 104.18.29.48
104.18.3.128 104.18.3.155 104.18.30.109 104.18.30.198
104.18.31.109 104.18.31.198 104.18.68.236 104.18.69.18