Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.34.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.34.143.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 05:16:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 143.34.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.34.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.78.245.122 attackbots
RDP Bruteforce
2019-06-21 14:32:45
46.229.168.150 attackspambots
Malicious Traffic/Form Submission
2019-06-21 14:38:19
221.239.131.124 attack
445/tcp
[2019-06-21]1pkt
2019-06-21 14:28:42
218.92.0.209 attack
Jun 21 02:05:33 plusreed sshd[30198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.209  user=root
Jun 21 02:05:35 plusreed sshd[30198]: Failed password for root from 218.92.0.209 port 60968 ssh2
...
2019-06-21 14:06:38
154.223.179.77 attack
3389BruteforceFW21
2019-06-21 14:34:16
138.68.249.4 attack
Invalid user admin from 138.68.249.4 port 37998
2019-06-21 14:26:57
66.96.204.235 attackspam
22/tcp
[2019-06-21]1pkt
2019-06-21 14:15:25
104.248.148.98 attackbots
Jun 21 06:43:09 srv206 sshd[7671]: Invalid user admin from 104.248.148.98
Jun 21 06:43:09 srv206 sshd[7671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.98
Jun 21 06:43:09 srv206 sshd[7671]: Invalid user admin from 104.248.148.98
Jun 21 06:43:11 srv206 sshd[7671]: Failed password for invalid user admin from 104.248.148.98 port 44694 ssh2
...
2019-06-21 14:22:15
134.249.141.24 attack
Blocked user enumeration attempt
2019-06-21 14:35:45
162.243.141.28 attackbotsspam
2362/udp 953/tcp 3306/tcp...
[2019-04-21/06-21]51pkt,40pt.(tcp),2pt.(udp)
2019-06-21 13:58:56
117.3.139.152 attackspam
445/tcp
[2019-06-21]1pkt
2019-06-21 14:39:34
141.98.81.37 attackbotsspam
Invalid user admin from 141.98.81.37 port 11805
2019-06-21 14:18:58
107.170.240.84 attackbotsspam
" "
2019-06-21 14:09:08
114.248.64.118 attackbots
Lines containing failures of 114.248.64.118
auth.log:Jun 20 20:10:01 omfg sshd[16628]: Connection from 114.248.64.118 port 59104 on 78.46.60.16 port 22
auth.log:Jun 20 20:10:02 omfg sshd[16628]: Bad protocol version identification '' from 114.248.64.118 port 59104
auth.log:Jun 20 20:10:03 omfg sshd[16782]: Connection from 114.248.64.118 port 59612 on 78.46.60.16 port 22
auth.log:Jun 20 20:10:21 omfg sshd[16782]: Invalid user support from 114.248.64.118
auth.log:Jun 20 20:10:23 omfg sshd[16782]: Connection closed by 114.248.64.118 port 59612 [preauth]
auth.log:Jun 20 20:10:24 omfg sshd[17444]: Connection from 114.248.64.118 port 38830 on 78.46.60.16 port 22
auth.log:Jun 20 20:10:38 omfg sshd[17444]: Invalid user ubnt from 114.248.64.118
auth.log:Jun 20 20:10:40 omfg sshd[17444]: Connection closed by 114.248.64.118 port 38830 [preauth]
auth.log:Jun 20 20:10:41 omfg sshd[17453]: Connection from 114.248.64.118 port 44916 on 78.46.60.16 port 22
auth.log:Jun 20 20:10:57 omfg s........
------------------------------
2019-06-21 14:19:47
42.227.109.6 attack
5500/tcp
[2019-06-21]1pkt
2019-06-21 14:40:13

Recently Reported IPs

104.18.34.141 104.18.34.147 104.18.34.149 104.18.34.155
104.18.34.158 104.18.34.159 104.18.34.164 104.18.34.167
104.18.34.168 104.18.34.17 104.18.34.170 104.18.34.172
104.18.34.173 104.18.34.175 104.18.34.180 104.18.34.185
104.18.34.191 104.18.34.193 104.18.34.194 104.18.34.196