Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.4.135 spam
Phishing
2023-06-15 05:17:06
104.18.44.158 attackbots
RUSSIAN SCAMMERS !
2020-04-20 18:13:49
104.18.47.6 attack
Brute force attack against VPN service
2020-04-01 01:18:33
104.18.48.6 attackspam
web spam and scam
2019-07-10 18:30:37
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.4.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34347
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.4.148.			IN	A

;; AUTHORITY SECTION:
.			535	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:25:10 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 148.4.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.4.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.95.228.177 attackbotsspam
Sep 27 05:21:54 hcbbdb sshd\[19880\]: Invalid user username from 81.95.228.177
Sep 27 05:21:54 hcbbdb sshd\[19880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.95.228.177
Sep 27 05:21:56 hcbbdb sshd\[19880\]: Failed password for invalid user username from 81.95.228.177 port 14950 ssh2
Sep 27 05:26:34 hcbbdb sshd\[20440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.95.228.177  user=root
Sep 27 05:26:36 hcbbdb sshd\[20440\]: Failed password for root from 81.95.228.177 port 35878 ssh2
2019-09-27 13:29:10
59.55.36.207 attack
Sep 26 23:54:35 esmtp postfix/smtpd[29797]: lost connection after AUTH from unknown[59.55.36.207]
Sep 26 23:54:41 esmtp postfix/smtpd[29797]: lost connection after AUTH from unknown[59.55.36.207]
Sep 26 23:54:46 esmtp postfix/smtpd[29945]: lost connection after AUTH from unknown[59.55.36.207]
Sep 26 23:54:52 esmtp postfix/smtpd[29797]: lost connection after AUTH from unknown[59.55.36.207]
Sep 26 23:54:58 esmtp postfix/smtpd[29984]: lost connection after AUTH from unknown[59.55.36.207]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=59.55.36.207
2019-09-27 13:20:40
58.210.46.54 attack
Sep 27 06:57:54 MK-Soft-VM5 sshd[26983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.46.54 
Sep 27 06:57:56 MK-Soft-VM5 sshd[26983]: Failed password for invalid user vision from 58.210.46.54 port 2059 ssh2
...
2019-09-27 13:26:53
200.69.65.234 attackspam
Sep 27 05:17:13 hcbbdb sshd\[19380\]: Invalid user 123 from 200.69.65.234
Sep 27 05:17:13 hcbbdb sshd\[19380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.65.234
Sep 27 05:17:15 hcbbdb sshd\[19380\]: Failed password for invalid user 123 from 200.69.65.234 port 26677 ssh2
Sep 27 05:21:56 hcbbdb sshd\[19890\]: Invalid user pass from 200.69.65.234
Sep 27 05:21:56 hcbbdb sshd\[19890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.65.234
2019-09-27 13:44:09
180.179.120.70 attackbots
Sep 27 05:54:51 pornomens sshd\[6179\]: Invalid user casimir from 180.179.120.70 port 46898
Sep 27 05:54:51 pornomens sshd\[6179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.120.70
Sep 27 05:54:53 pornomens sshd\[6179\]: Failed password for invalid user casimir from 180.179.120.70 port 46898 ssh2
...
2019-09-27 13:24:14
89.163.242.62 attackspam
Automated report (2019-09-27T03:54:13+00:00). Misbehaving bot detected at this address.
2019-09-27 13:55:44
5.23.79.3 attackspambots
Sep 26 19:46:20 hanapaa sshd\[13979\]: Invalid user hk from 5.23.79.3
Sep 26 19:46:20 hanapaa sshd\[13979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=postur.emax.is
Sep 26 19:46:23 hanapaa sshd\[13979\]: Failed password for invalid user hk from 5.23.79.3 port 47875 ssh2
Sep 26 19:50:37 hanapaa sshd\[14395\]: Invalid user factorio from 5.23.79.3
Sep 26 19:50:37 hanapaa sshd\[14395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=postur.emax.is
2019-09-27 13:56:37
103.241.204.1 attackspam
(From info@wrldclass-solutions.com) Good Day,

Lucas Weber Here from World Class Solutions, wondering 
can we publish your blog post over here? We are looking to 
publish new content and would love to hear about any new products,
or new subjects regarding your website here at drpastro.com .

You can submit your post directly to us here:

www.worldclass-solutions.space

Generally, it can be any general article with a minimum of 500 words, and the more words, the better.

Please let me know,
Cheers
Lucas
2019-09-27 13:22:52
171.126.212.171 attackspambots
Unauthorised access (Sep 27) SRC=171.126.212.171 LEN=40 TTL=49 ID=31800 TCP DPT=8080 WINDOW=25367 SYN
2019-09-27 14:05:53
140.143.22.200 attackspam
Sep 27 07:56:54 MK-Soft-VM7 sshd[5966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.22.200 
Sep 27 07:56:56 MK-Soft-VM7 sshd[5966]: Failed password for invalid user mysql from 140.143.22.200 port 40738 ssh2
...
2019-09-27 14:07:56
91.106.193.72 attack
Sep 27 07:16:24 ns41 sshd[27784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.106.193.72
2019-09-27 13:59:01
157.230.113.218 attackbots
Sep 26 19:10:51 web1 sshd\[18395\]: Invalid user alary from 157.230.113.218
Sep 26 19:10:51 web1 sshd\[18395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.218
Sep 26 19:10:53 web1 sshd\[18395\]: Failed password for invalid user alary from 157.230.113.218 port 35028 ssh2
Sep 26 19:15:02 web1 sshd\[18937\]: Invalid user sandra from 157.230.113.218
Sep 26 19:15:02 web1 sshd\[18937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.218
2019-09-27 13:15:44
123.108.200.150 attackspam
2019-09-27T06:04:16.776841hub.schaetter.us sshd\[29792\]: Invalid user qomo from 123.108.200.150 port 36210
2019-09-27T06:04:16.788915hub.schaetter.us sshd\[29792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.200.150
2019-09-27T06:04:18.552135hub.schaetter.us sshd\[29792\]: Failed password for invalid user qomo from 123.108.200.150 port 36210 ssh2
2019-09-27T06:08:52.505370hub.schaetter.us sshd\[29832\]: Invalid user aeneas from 123.108.200.150 port 48532
2019-09-27T06:08:52.525154hub.schaetter.us sshd\[29832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.200.150
...
2019-09-27 14:08:59
114.237.109.159 attackspambots
$f2bV_matches
2019-09-27 14:06:15
181.29.21.191 attack
Sep 27 06:59:53 ArkNodeAT sshd\[3992\]: Invalid user rack from 181.29.21.191
Sep 27 06:59:53 ArkNodeAT sshd\[3992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.29.21.191
Sep 27 06:59:55 ArkNodeAT sshd\[3992\]: Failed password for invalid user rack from 181.29.21.191 port 59494 ssh2
2019-09-27 13:46:39

Recently Reported IPs

104.18.4.32 104.18.5.163 104.18.5.186 125.212.211.133
104.18.5.32 104.18.5.8 104.18.4.45 104.18.4.8
104.18.5.110 104.18.6.125 104.18.6.161 104.18.6.102
104.18.5.45 125.212.211.142 104.18.6.224 104.18.6.212
104.18.66.135 104.18.69.135 104.18.66.62 104.18.6.32