Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.245.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39399
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.245.18.			IN	A

;; AUTHORITY SECTION:
.			257	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051902 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 20 11:24:38 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 18.245.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.245.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.24.148.47 attack
Telnet/23 MH Probe, BF, Hack -
2019-12-06 05:53:54
186.10.17.84 attackbots
Dec  5 22:19:16 vps647732 sshd[25607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.17.84
Dec  5 22:19:18 vps647732 sshd[25607]: Failed password for invalid user by from 186.10.17.84 port 59978 ssh2
...
2019-12-06 05:25:10
186.125.59.12 attackspambots
(imapd) Failed IMAP login from 186.125.59.12 (AR/Argentina/host12.186-125-59.telecom.net.ar): 1 in the last 3600 secs
2019-12-06 05:33:35
39.41.165.93 attackspam
Dec  5 21:58:54 nexus sshd[8149]: Invalid user nagesh from 39.41.165.93 port 54863
Dec  5 21:58:58 nexus sshd[8149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.41.165.93
Dec  5 21:58:59 nexus sshd[8149]: Failed password for invalid user nagesh from 39.41.165.93 port 54863 ssh2
Dec  5 21:59:00 nexus sshd[8149]: Connection reset by 39.41.165.93 port 54863 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.41.165.93
2019-12-06 05:49:08
120.88.46.226 attackspam
Dec  5 16:04:09 plusreed sshd[547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.88.46.226  user=root
Dec  5 16:04:11 plusreed sshd[547]: Failed password for root from 120.88.46.226 port 45776 ssh2
...
2019-12-06 05:15:43
183.215.233.56 attack
Dec  5 21:20:12 zulu1842 sshd[27508]: Did not receive identification string from 183.215.233.56
Dec  5 21:20:54 zulu1842 sshd[27538]: Invalid user sai from 183.215.233.56
Dec  5 21:20:54 zulu1842 sshd[27538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.215.233.56 
Dec  5 21:20:56 zulu1842 sshd[27538]: Failed password for invalid user sai from 183.215.233.56 port 40601 ssh2
Dec  5 21:20:56 zulu1842 sshd[27538]: Received disconnect from 183.215.233.56: 11: Bye Bye [preauth]
Dec  5 21:38:53 zulu1842 sshd[29879]: Did not receive identification string from 183.215.233.56
Dec  5 21:39:32 zulu1842 sshd[30027]: Invalid user hang from 183.215.233.56
Dec  5 21:39:32 zulu1842 sshd[30027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.215.233.56 
Dec  5 21:39:34 zulu1842 sshd[30027]: Failed password for invalid user hang from 183.215.233.56 port 53492 ssh2
Dec  5 21:39:34 zulu1842 sshd[300........
-------------------------------
2019-12-06 05:09:55
111.40.160.218 attackspam
2019-12-05T20:58:06.410973shield sshd\[15431\]: Invalid user pasek from 111.40.160.218 port 43457
2019-12-05T20:58:06.415536shield sshd\[15431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.40.160.218
2019-12-05T20:58:08.158704shield sshd\[15431\]: Failed password for invalid user pasek from 111.40.160.218 port 43457 ssh2
2019-12-05T21:04:07.944808shield sshd\[16528\]: Invalid user aschim from 111.40.160.218 port 34836
2019-12-05T21:04:07.949447shield sshd\[16528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.40.160.218
2019-12-06 05:21:18
113.173.137.74 attack
Sending SPAM email
2019-12-06 05:16:03
92.222.158.249 attackspambots
Dec  5 13:05:57 mockhub sshd[11261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.158.249
Dec  5 13:05:58 mockhub sshd[11261]: Failed password for invalid user kretschmer from 92.222.158.249 port 39284 ssh2
...
2019-12-06 05:09:36
218.92.0.138 attackspambots
Dec  5 22:09:32 vps666546 sshd\[27545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Dec  5 22:09:34 vps666546 sshd\[27545\]: Failed password for root from 218.92.0.138 port 2424 ssh2
Dec  5 22:09:38 vps666546 sshd\[27545\]: Failed password for root from 218.92.0.138 port 2424 ssh2
Dec  5 22:09:41 vps666546 sshd\[27545\]: Failed password for root from 218.92.0.138 port 2424 ssh2
Dec  5 22:09:44 vps666546 sshd\[27545\]: Failed password for root from 218.92.0.138 port 2424 ssh2
...
2019-12-06 05:10:47
217.248.61.174 attackspam
Dec  6 07:24:14 our-server-hostname postfix/smtpd[9824]: connect from unknown[217.248.61.174]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=217.248.61.174
2019-12-06 05:33:07
37.139.0.226 attackspam
Dec  5 22:26:13 vps647732 sshd[25822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.0.226
Dec  5 22:26:15 vps647732 sshd[25822]: Failed password for invalid user nv from 37.139.0.226 port 35418 ssh2
...
2019-12-06 05:50:08
178.219.50.205 attackbots
12/05/2019-16:04:10.680121 178.219.50.205 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-06 05:18:03
188.254.0.182 attackspam
Dec  5 22:29:48 srv01 sshd[12504]: Invalid user M from 188.254.0.182 port 47802
Dec  5 22:29:48 srv01 sshd[12504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182
Dec  5 22:29:48 srv01 sshd[12504]: Invalid user M from 188.254.0.182 port 47802
Dec  5 22:29:50 srv01 sshd[12504]: Failed password for invalid user M from 188.254.0.182 port 47802 ssh2
Dec  5 22:35:09 srv01 sshd[12936]: Invalid user moser from 188.254.0.182 port 56216
...
2019-12-06 05:36:03
195.154.38.177 attackspambots
Dec  6 00:00:14 server sshd\[30954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.38.177  user=root
Dec  6 00:00:16 server sshd\[30954\]: Failed password for root from 195.154.38.177 port 32864 ssh2
Dec  6 00:07:02 server sshd\[414\]: Invalid user pemp from 195.154.38.177
Dec  6 00:07:02 server sshd\[414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.38.177 
Dec  6 00:07:04 server sshd\[414\]: Failed password for invalid user pemp from 195.154.38.177 port 44578 ssh2
...
2019-12-06 05:23:41

Recently Reported IPs

104.18.24.78 173.180.42.26 196.32.69.80 104.18.33.200
104.18.33.207 104.18.33.208 104.18.33.209 104.18.33.21
104.18.33.211 104.18.33.212 104.18.33.213 104.18.33.215
104.18.33.216 104.18.33.217 104.18.33.218 104.18.33.220
104.18.33.222 74.55.80.201 104.18.33.225 104.18.33.226