Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.38.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60382
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.38.216.			IN	A

;; AUTHORITY SECTION:
.			257	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040801 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 09 04:08:47 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 216.38.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.38.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.201.123.24 attackspambots
139/tcp 22/tcp 22/tcp
[2019-05-12/07-10]3pkt
2019-07-10 23:37:36
62.234.5.142 attack
This address tries to hack into our database, bruteforce with dictionary.
62.234.5.142 - - [10/Jul/2019:10:28:49 +0200] "GET /phpmyadmin/index.php?pma_username=root&pma_password=star&server=1 HTTP/1.1" 200 15880 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT$
62.234.5.142 - - [10/Jul/2019:10:28:51 +0200] "GET /phpmyadmin/index.php?pma_username=root&pma_password=aaa&server=1 HTTP/1.1" 200 15874 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT $
62.234.5.142 - - [10/Jul/2019:10:28:51 +0200] "GET /phpmyadmin/index.php?pma_username=root&pma_password=web&server=1 HTTP/1.1" 200 15886 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT $
62.234.5.142 - - [10/Jul/2019:10:28:53 +0200] "GET /phpmyadmin/index.php?pma_username=root&pma_password=asd&server=1 HTTP/1.1" 200 15875 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT $
2019-07-11 00:13:49
104.236.224.134 attackspam
(sshd) Failed SSH login from 104.236.224.134 (-): 5 in the last 3600 secs
2019-07-11 00:03:51
189.146.174.126 attackbotsspam
2323/tcp 23/tcp
[2019-06-27/07-10]2pkt
2019-07-10 23:22:44
78.172.136.188 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-11 00:09:18
184.105.247.254 attackbotsspam
389/tcp 7547/tcp 873/tcp...
[2019-05-11/07-10]39pkt,17pt.(tcp),2pt.(udp)
2019-07-10 23:49:29
132.232.4.33 attackspambots
SSH Brute Force
2019-07-10 23:12:37
112.221.179.133 attack
SSH Brute Force, server-1 sshd[10087]: Failed password for invalid user group from 112.221.179.133 port 45982 ssh2
2019-07-10 23:52:49
194.208.107.138 attackspam
8080/tcp
[2019-07-10]1pkt
2019-07-11 00:14:16
209.186.58.108 attack
Unauthorized connection attempt from IP address 209.186.58.108 on Port 3389(RDP)
2019-07-10 23:14:02
196.52.43.63 attackspambots
8531/tcp 2160/tcp 5289/tcp...
[2019-05-09/07-09]86pkt,48pt.(tcp),3pt.(udp),1tp.(icmp)
2019-07-10 23:54:38
139.199.158.14 attackspam
Jul 10 14:34:20 *** sshd[5835]: Invalid user administrator from 139.199.158.14
2019-07-10 23:08:50
1.175.81.64 attackspam
37215/tcp 23/tcp 37215/tcp
[2019-07-05/10]3pkt
2019-07-10 23:16:11
103.252.5.93 attackspam
445/tcp
[2019-07-10]1pkt
2019-07-11 00:02:42
41.77.145.14 attack
Unauthorized connection attempt from IP address 41.77.145.14 on Port 445(SMB)
2019-07-10 23:51:23

Recently Reported IPs

104.18.38.194 104.18.38.226 104.18.38.52 104.18.38.61
104.18.39.5 104.18.39.54 104.18.39.65 104.18.39.82
104.18.40.145 104.18.40.173 104.18.40.193 104.18.40.243
104.18.40.35 104.18.41.101 104.18.41.168 104.18.41.241
104.20.99.46 104.200.16.65 104.200.19.11 104.200.19.212