Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.30.4 attack
"MarketingPromoSystems, 8 The Green Suite #5828 Dover DE" 185.230.46.95 - phishing redirect www.starvingbarber.com
2020-05-25 00:12:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.30.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23795
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.30.164.			IN	A

;; AUTHORITY SECTION:
.			420	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:53:27 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 164.30.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.30.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
140.143.17.199 attack
$f2bV_matches
2019-12-30 17:26:36
185.2.112.21 attack
Dec 29 11:54:03 vpxxxxxxx22308 sshd[17126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.112.21  user=r.r
Dec 29 11:54:05 vpxxxxxxx22308 sshd[17126]: Failed password for r.r from 185.2.112.21 port 32844 ssh2
Dec 29 11:54:16 vpxxxxxxx22308 sshd[17159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.112.21  user=r.r
Dec 29 11:54:18 vpxxxxxxx22308 sshd[17159]: Failed password for r.r from 185.2.112.21 port 47828 ssh2
Dec 29 11:54:23 vpxxxxxxx22308 sshd[17165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.112.21  user=r.r
Dec 29 11:54:25 vpxxxxxxx22308 sshd[17165]: Failed password for r.r from 185.2.112.21 port 55316 ssh2
Dec 29 11:54:30 vpxxxxxxx22308 sshd[17178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.112.21  user=r.r
Dec 29 11:54:32 vpxxxxxxx22308 sshd[17178]: Failed password........
------------------------------
2019-12-30 17:51:56
139.255.174.85 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-12-30 17:39:30
185.176.27.34 attackspam
Dec 30 07:27:02 debian-2gb-nbg1-2 kernel: \[1339930.336975\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.34 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=37400 PROTO=TCP SPT=54376 DPT=11483 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-30 17:30:37
52.187.106.61 attackspam
ssh brute force
2019-12-30 17:34:16
202.164.152.56 attackbotsspam
3389BruteforceFW22
2019-12-30 17:56:01
37.49.230.74 attackbotsspam
\[2019-12-30 04:24:52\] NOTICE\[2839\] chan_sip.c: Registration from '"30" \' failed for '37.49.230.74:5539' - Wrong password
\[2019-12-30 04:24:52\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-30T04:24:52.549-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="30",SessionID="0x7f0fb46d4ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.74/5539",Challenge="2e8b933b",ReceivedChallenge="2e8b933b",ReceivedHash="bf69598f74d2630b15a7a70186920922"
\[2019-12-30 04:24:52\] NOTICE\[2839\] chan_sip.c: Registration from '"30" \' failed for '37.49.230.74:5539' - Wrong password
\[2019-12-30 04:24:52\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-30T04:24:52.653-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="30",SessionID="0x7f0fb4c17178",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.74/
2019-12-30 17:26:09
49.73.174.8 attack
Scanning
2019-12-30 17:37:35
223.4.68.38 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.4.68.38  user=root
Failed password for root from 223.4.68.38 port 43090 ssh2
Invalid user kanserud from 223.4.68.38 port 45086
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.4.68.38
Failed password for invalid user kanserud from 223.4.68.38 port 45086 ssh2
2019-12-30 17:50:42
113.71.62.202 attackspam
Scanning
2019-12-30 17:45:17
192.241.169.184 attackspam
Invalid user games1 from 192.241.169.184 port 33860
2019-12-30 17:59:51
185.156.73.60 attackspam
Dec 30 10:25:59 debian-2gb-nbg1-2 kernel: \[1350666.521970\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.60 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=30601 PROTO=TCP SPT=54074 DPT=42820 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-30 17:39:48
110.138.151.30 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-12-30 17:44:30
14.161.40.174 attack
Caught in portsentry honeypot
2019-12-30 17:49:11
177.91.80.162 attackspambots
ssh brute force
2019-12-30 17:38:52

Recently Reported IPs

104.18.30.158 104.18.30.137 104.18.30.140 104.18.30.161
104.18.30.155 104.18.30.165 104.18.30.17 104.18.30.170
104.18.30.173 104.18.30.171 104.21.65.252 104.18.30.183
104.18.30.196 104.18.30.18 104.18.30.203 104.18.30.200
104.18.30.215 104.18.30.217 104.18.30.225 104.18.30.230