Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.30.4 attack
"MarketingPromoSystems, 8 The Green Suite #5828 Dover DE" 185.230.46.95 - phishing redirect www.starvingbarber.com
2020-05-25 00:12:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.30.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31911
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.30.66.			IN	A

;; AUTHORITY SECTION:
.			546	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 15:15:23 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 66.30.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.30.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
143.215.172.69 attack
Port scan on 1 port(s): 53
2019-06-30 20:19:52
185.176.27.78 attack
firewall-block, port(s): 7694/tcp
2019-06-30 20:33:10
27.72.72.111 attackbots
Unauthorized connection attempt from IP address 27.72.72.111 on Port 445(SMB)
2019-06-30 20:43:12
91.215.128.131 attack
Jun 30 11:12:23 vpn01 sshd\[18721\]: Invalid user guest from 91.215.128.131
Jun 30 11:12:23 vpn01 sshd\[18721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.215.128.131
Jun 30 11:12:25 vpn01 sshd\[18721\]: Failed password for invalid user guest from 91.215.128.131 port 33962 ssh2
2019-06-30 21:11:28
92.222.84.34 attackbots
Brute SSH
2019-06-30 20:23:37
92.177.197.60 attackspambots
Jun 30 08:18:01 debian sshd\[25669\]: Invalid user mysql from 92.177.197.60 port 49695
Jun 30 08:18:01 debian sshd\[25669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.177.197.60
Jun 30 08:18:03 debian sshd\[25669\]: Failed password for invalid user mysql from 92.177.197.60 port 49695 ssh2
...
2019-06-30 20:36:52
113.182.197.128 attack
Unauthorized connection attempt from IP address 113.182.197.128 on Port 445(SMB)
2019-06-30 20:33:46
98.143.220.4 attack
SSH-BRUTEFORCE
2019-06-30 20:47:54
46.167.97.178 attackspam
Unauthorized connection attempt from IP address 46.167.97.178 on Port 445(SMB)
2019-06-30 20:31:08
183.89.168.193 attackbotsspam
Unauthorized connection attempt from IP address 183.89.168.193 on Port 445(SMB)
2019-06-30 20:44:11
62.210.69.248 attack
firewall-block, port(s): 5060/udp
2019-06-30 20:52:25
94.101.82.10 attackbots
SSH-BRUTEFORCE
2019-06-30 21:03:07
95.77.227.74 attack
2019-06-30T14:40:25.267579test01.cajus.name sshd\[2731\]: Invalid user t7adm from 95.77.227.74 port 55324
2019-06-30T14:40:25.286960test01.cajus.name sshd\[2731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.77.227.74
2019-06-30T14:40:26.639062test01.cajus.name sshd\[2731\]: Failed password for invalid user t7adm from 95.77.227.74 port 55324 ssh2
2019-06-30 20:54:11
95.105.233.248 attackspambots
Jun 30 04:32:49 MK-Soft-VM5 sshd\[24117\]: Invalid user test from 95.105.233.248 port 37513
Jun 30 04:32:49 MK-Soft-VM5 sshd\[24117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.105.233.248
Jun 30 04:32:51 MK-Soft-VM5 sshd\[24117\]: Failed password for invalid user test from 95.105.233.248 port 37513 ssh2
...
2019-06-30 20:58:07
125.160.86.128 attack
Unauthorized connection attempt from IP address 125.160.86.128 on Port 445(SMB)
2019-06-30 20:24:53

Recently Reported IPs

104.18.30.57 104.18.30.70 104.18.30.72 246.217.116.154
104.18.31.107 104.18.31.122 104.18.31.124 104.18.31.125
233.201.30.220 104.18.31.128 104.18.31.149 104.18.31.151
104.18.31.152 104.18.31.157 104.18.31.184 104.18.31.189
104.18.31.191 104.18.31.194 104.18.31.208 31.195.38.70