Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.28.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.28.142.			IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:51:59 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 142.28.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.28.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.198.214.207 attackbots
ads.txt Drone detected by safePassage
2019-08-12 01:15:43
123.207.74.24 attack
Automatic report - Banned IP Access
2019-08-12 01:31:24
51.38.129.120 attackbots
Aug 11 20:12:41 vibhu-HP-Z238-Microtower-Workstation sshd\[4535\]: Invalid user keith from 51.38.129.120
Aug 11 20:12:41 vibhu-HP-Z238-Microtower-Workstation sshd\[4535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.129.120
Aug 11 20:12:43 vibhu-HP-Z238-Microtower-Workstation sshd\[4535\]: Failed password for invalid user keith from 51.38.129.120 port 59466 ssh2
Aug 11 20:17:03 vibhu-HP-Z238-Microtower-Workstation sshd\[4685\]: Invalid user redmine from 51.38.129.120
Aug 11 20:17:03 vibhu-HP-Z238-Microtower-Workstation sshd\[4685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.129.120
...
2019-08-12 01:28:23
106.13.133.80 attackbotsspam
Aug 11 19:57:03 hosting sshd[6762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.133.80  user=root
Aug 11 19:57:05 hosting sshd[6762]: Failed password for root from 106.13.133.80 port 46114 ssh2
...
2019-08-12 01:20:56
131.100.76.126 attack
Aug 11 09:43:53 xeon postfix/smtpd[17763]: warning: 126-76-100-131.internetcentral.com.br[131.100.76.126]: SASL PLAIN authentication failed: authentication failure
2019-08-12 01:41:15
27.221.81.138 attackspam
Invalid user alicia from 27.221.81.138 port 50688
2019-08-12 00:53:04
5.70.112.146 attack
Automatic report - Port Scan Attack
2019-08-12 01:27:45
80.99.218.149 attack
LGS,WP GET /wp-login.php
2019-08-12 01:43:37
51.83.74.203 attackspam
Aug 11 11:30:46 rpi sshd[29747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.203 
Aug 11 11:30:48 rpi sshd[29747]: Failed password for invalid user polly from 51.83.74.203 port 42866 ssh2
2019-08-12 00:52:23
189.198.245.229 attackspambots
5555/tcp
[2019-08-11]1pkt
2019-08-12 00:44:51
92.63.194.115 attack
08/11/2019-13:05:26.158061 92.63.194.115 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-12 01:25:55
177.180.92.91 attack
23/tcp
[2019-08-11]1pkt
2019-08-12 00:41:24
23.237.42.10 attackspambots
19/8/11@03:44:48: FAIL: Alarm-Intrusion address from=23.237.42.10
...
2019-08-12 01:29:00
159.192.240.71 attack
Aug 11 17:07:07 our-server-hostname postfix/smtpd[21449]: connect from unknown[159.192.240.71]
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.192.240.71
2019-08-12 01:29:29
182.61.50.25 attack
2019-08-11T14:19:05.284841  sshd[32728]: Invalid user cmveng from 182.61.50.25 port 59236
2019-08-11T14:19:05.297765  sshd[32728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.50.25
2019-08-11T14:19:05.284841  sshd[32728]: Invalid user cmveng from 182.61.50.25 port 59236
2019-08-11T14:19:07.294832  sshd[32728]: Failed password for invalid user cmveng from 182.61.50.25 port 59236 ssh2
2019-08-11T14:24:08.066816  sshd[32759]: Invalid user lilycity from 182.61.50.25 port 44064
...
2019-08-12 01:24:48

Recently Reported IPs

104.21.65.216 33.70.70.134 104.18.28.144 104.18.28.134
104.18.28.149 104.18.28.146 104.18.28.189 104.18.28.183
104.18.28.165 104.18.28.195 104.18.28.157 104.21.65.217
104.18.28.203 104.18.28.200 86.128.104.109 104.18.28.196
104.18.28.204 104.18.28.192 104.18.28.213 104.18.28.21