Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.39.8 attack
Ayva no-reply@des.iwannameetupnow.com
!~!~Quick fuck ~!~!~!
http://click.iwannameetupnow.com
These people are seeking fast and discreet affairs.
2020-02-19 23:30:45
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.39.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24750
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.39.49.			IN	A

;; AUTHORITY SECTION:
.			544	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052200 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 22 22:48:06 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 49.39.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.39.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.235.53.171 attackspam
1433/tcp 1433/tcp 445/tcp
[2020-03-11/22]3pkt
2020-03-23 17:50:00
119.237.97.177 attack
Honeypot attack, port: 5555, PTR: n11923797177.netvigator.com.
2020-03-23 17:32:23
77.150.137.231 attack
Mar 23 08:26:32 ns392434 sshd[13295]: Invalid user xn from 77.150.137.231 port 53702
Mar 23 08:26:32 ns392434 sshd[13295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.150.137.231
Mar 23 08:26:32 ns392434 sshd[13295]: Invalid user xn from 77.150.137.231 port 53702
Mar 23 08:26:33 ns392434 sshd[13295]: Failed password for invalid user xn from 77.150.137.231 port 53702 ssh2
Mar 23 08:39:41 ns392434 sshd[13591]: Invalid user test2 from 77.150.137.231 port 38466
Mar 23 08:39:41 ns392434 sshd[13591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.150.137.231
Mar 23 08:39:41 ns392434 sshd[13591]: Invalid user test2 from 77.150.137.231 port 38466
Mar 23 08:39:43 ns392434 sshd[13591]: Failed password for invalid user test2 from 77.150.137.231 port 38466 ssh2
Mar 23 08:47:42 ns392434 sshd[13765]: Invalid user miki from 77.150.137.231 port 51984
2020-03-23 17:43:46
116.247.81.100 attackbotsspam
Mar 23 09:46:18 lukav-desktop sshd\[1504\]: Invalid user solr from 116.247.81.100
Mar 23 09:46:18 lukav-desktop sshd\[1504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.100
Mar 23 09:46:19 lukav-desktop sshd\[1504\]: Failed password for invalid user solr from 116.247.81.100 port 48579 ssh2
Mar 23 09:51:17 lukav-desktop sshd\[9126\]: Invalid user alfred from 116.247.81.100
Mar 23 09:51:17 lukav-desktop sshd\[9126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.100
2020-03-23 17:07:18
193.77.155.50 attackspam
Mar 23 08:25:22 host01 sshd[29974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.155.50 
Mar 23 08:25:24 host01 sshd[29974]: Failed password for invalid user user from 193.77.155.50 port 7052 ssh2
Mar 23 08:31:33 host01 sshd[30996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.155.50 
...
2020-03-23 17:08:32
134.209.71.245 attackbotsspam
Mar 23 09:23:41 nextcloud sshd\[6867\]: Invalid user uptime from 134.209.71.245
Mar 23 09:23:41 nextcloud sshd\[6867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.71.245
Mar 23 09:23:43 nextcloud sshd\[6867\]: Failed password for invalid user uptime from 134.209.71.245 port 35346 ssh2
2020-03-23 17:15:13
192.241.236.41 attackspam
58078/tcp 7002/tcp 5351/udp...
[2020-02-15/03-22]17pkt,11pt.(tcp),3pt.(udp)
2020-03-23 17:20:26
185.216.140.252 attackspambots
firewall-block, port(s): 5311/tcp, 5316/tcp, 5318/tcp, 5321/tcp
2020-03-23 17:06:48
185.195.25.111 attackspam
Mar 23 02:30:28 server sshd\[21074\]: Failed password for invalid user cpanel from 185.195.25.111 port 36530 ssh2
Mar 23 09:24:52 server sshd\[25073\]: Invalid user user from 185.195.25.111
Mar 23 09:24:52 server sshd\[25073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.195.25.111 
Mar 23 09:24:54 server sshd\[25073\]: Failed password for invalid user user from 185.195.25.111 port 58800 ssh2
Mar 23 09:36:15 server sshd\[27753\]: Invalid user language from 185.195.25.111
Mar 23 09:36:15 server sshd\[27753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.195.25.111 
...
2020-03-23 17:35:14
185.185.69.245 attackbotsspam
2020-03-2307:34:451jGGfc-0004xO-8Q\<=info@whatsup2013.chH=\(localhost\)[14.186.43.242]:49712P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3595id=313482D1DA0E20934F4A03BB7FA3DD33@whatsup2013.chT="iamChristina"foralex25272@gmail.comstevedd618139@gmail.com2020-03-2307:35:251jGGgH-00051w-0h\<=info@whatsup2013.chH=\(localhost\)[185.185.69.245]:48438P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3753id=1411A7F4FF2B05B66A6F269E5A7AC22C@whatsup2013.chT="iamChristina"foralexsalacu@gmail.comkennethlovejoy75@gmail.com2020-03-2307:35:031jGGfq-0004u4-HB\<=info@whatsup2013.chH=\(localhost\)[113.161.48.167]:38477P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3710id=494CFAA9A27658EB37327BC3070581DB@whatsup2013.chT="iamChristina"forbustosjulia736@gmail.comgalikteri@yahoo.com2020-03-2307:36:101jGGgy-000562-Lv\<=info@whatsup2013.chH=\(localhost\)[14.160.241.158]:52166P=esmtpsaX=TLS1.2:ECDHE-
2020-03-23 17:35:38
198.108.66.234 attackbotsspam
9143/tcp 9386/tcp 12171/tcp...
[2020-01-26/03-23]84pkt,81pt.(tcp),1tp.(icmp)
2020-03-23 17:42:22
106.12.193.217 attackbots
Mar 22 21:06:16 web1 sshd\[4635\]: Invalid user meissen from 106.12.193.217
Mar 22 21:06:16 web1 sshd\[4635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.217
Mar 22 21:06:18 web1 sshd\[4635\]: Failed password for invalid user meissen from 106.12.193.217 port 50218 ssh2
Mar 22 21:10:32 web1 sshd\[5126\]: Invalid user angella from 106.12.193.217
Mar 22 21:10:32 web1 sshd\[5126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.217
2020-03-23 17:12:34
207.166.130.229 attackbotsspam
Host Scan
2020-03-23 17:14:25
217.182.70.125 attackspambots
Mar 23 09:25:04 ns3042688 sshd\[3056\]: Invalid user admin from 217.182.70.125
Mar 23 09:25:06 ns3042688 sshd\[3056\]: Failed password for invalid user admin from 217.182.70.125 port 58867 ssh2
Mar 23 09:28:57 ns3042688 sshd\[3891\]: Invalid user julies from 217.182.70.125
Mar 23 09:28:59 ns3042688 sshd\[3891\]: Failed password for invalid user julies from 217.182.70.125 port 50949 ssh2
Mar 23 09:32:58 ns3042688 sshd\[5323\]: Invalid user kayin from 217.182.70.125
...
2020-03-23 17:50:15
187.87.242.63 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-23 17:09:07

Recently Reported IPs

104.18.39.47 104.18.39.50 104.18.39.55 104.18.39.56
104.18.39.58 104.18.39.61 104.18.39.67 104.18.39.69
104.18.39.71 104.18.39.72 104.18.39.76 104.18.4.126
104.18.40.125 104.18.40.163 104.18.40.178 104.18.40.234
104.18.40.250 104.18.41.132 104.18.41.148 104.18.41.176