Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.4.135 spam
Phishing
2023-06-15 05:17:06
104.18.44.158 attackbots
RUSSIAN SCAMMERS !
2020-04-20 18:13:49
104.18.47.6 attack
Brute force attack against VPN service
2020-04-01 01:18:33
104.18.48.6 attackspam
web spam and scam
2019-07-10 18:30:37
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.4.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52635
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.4.16.			IN	A

;; AUTHORITY SECTION:
.			584	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:23:16 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 16.4.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.4.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.150.14.82 attackbotsspam
[portscan] Port scan
2019-09-22 01:25:10
5.135.223.35 attackbotsspam
F2B jail: sshd. Time: 2019-09-21 19:10:03, Reported by: VKReport
2019-09-22 01:33:10
60.21.243.233 attack
Unauthorised access (Sep 21) SRC=60.21.243.233 LEN=40 TTL=49 ID=28333 TCP DPT=8080 WINDOW=36031 SYN
2019-09-22 01:09:28
54.37.158.40 attack
Sep 21 07:00:19 friendsofhawaii sshd\[20009\]: Invalid user magic from 54.37.158.40
Sep 21 07:00:19 friendsofhawaii sshd\[20009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-54-37-158.eu
Sep 21 07:00:21 friendsofhawaii sshd\[20009\]: Failed password for invalid user magic from 54.37.158.40 port 45920 ssh2
Sep 21 07:04:31 friendsofhawaii sshd\[20354\]: Invalid user raquel from 54.37.158.40
Sep 21 07:04:31 friendsofhawaii sshd\[20354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-54-37-158.eu
2019-09-22 01:12:52
80.211.245.183 attackbots
Sep 21 17:35:19 vps647732 sshd[5644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.245.183
Sep 21 17:35:21 vps647732 sshd[5644]: Failed password for invalid user admin from 80.211.245.183 port 55040 ssh2
...
2019-09-22 01:27:46
177.91.68.206 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 12:49:57,711 INFO [amun_request_handler] PortScan Detected on Port: 445 (177.91.68.206)
2019-09-22 01:04:28
182.61.105.104 attackbots
Sep 21 18:53:15 core sshd[32456]: Invalid user maressa from 182.61.105.104 port 35786
Sep 21 18:53:18 core sshd[32456]: Failed password for invalid user maressa from 182.61.105.104 port 35786 ssh2
...
2019-09-22 00:57:16
178.206.64.237 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 12:50:54,835 INFO [amun_request_handler] PortScan Detected on Port: 445 (178.206.64.237)
2019-09-22 00:53:06
46.173.214.68 attackbots
Sep 21 18:37:12 vps647732 sshd[7531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.173.214.68
Sep 21 18:37:13 vps647732 sshd[7531]: Failed password for invalid user guo from 46.173.214.68 port 59202 ssh2
...
2019-09-22 00:56:22
118.68.106.60 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 12:49:36,674 INFO [amun_request_handler] PortScan Detected on Port: 445 (118.68.106.60)
2019-09-22 01:07:23
23.94.205.209 attack
Sep 21 10:43:18 vtv3 sshd\[24817\]: Invalid user ben from 23.94.205.209 port 48776
Sep 21 10:43:18 vtv3 sshd\[24817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.205.209
Sep 21 10:43:20 vtv3 sshd\[24817\]: Failed password for invalid user ben from 23.94.205.209 port 48776 ssh2
Sep 21 10:46:58 vtv3 sshd\[26928\]: Invalid user tempuser from 23.94.205.209 port 41214
Sep 21 10:46:58 vtv3 sshd\[26928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.205.209
Sep 21 10:57:48 vtv3 sshd\[32290\]: Invalid user temp from 23.94.205.209 port 46640
Sep 21 10:57:48 vtv3 sshd\[32290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.205.209
Sep 21 10:57:50 vtv3 sshd\[32290\]: Failed password for invalid user temp from 23.94.205.209 port 46640 ssh2
Sep 21 11:01:30 vtv3 sshd\[1924\]: Invalid user gpadmin from 23.94.205.209 port 39088
Sep 21 11:01:30 vtv3 sshd\[1924\]: pam_unix
2019-09-22 00:59:36
106.12.38.84 attackbotsspam
Sep 21 11:32:43 dallas01 sshd[22199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.84
Sep 21 11:32:45 dallas01 sshd[22199]: Failed password for invalid user ubuntu from 106.12.38.84 port 47748 ssh2
Sep 21 11:36:55 dallas01 sshd[22758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.84
2019-09-22 01:38:53
189.195.143.166 attackspam
Unauthorised access (Sep 21) SRC=189.195.143.166 LEN=40 TTL=227 ID=4034 TCP DPT=445 WINDOW=1024 SYN
2019-09-22 01:32:24
125.165.207.170 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 13:21:56,229 INFO [shellcode_manager] (125.165.207.170) no match, writing hexdump (6178c02303d072fe32c41851530ab26e :1911376) - SMB (Unknown)
2019-09-22 01:26:52
101.207.134.63 attackbots
Sep 21 07:09:04 web1 sshd\[18932\]: Invalid user rb from 101.207.134.63
Sep 21 07:09:04 web1 sshd\[18932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.207.134.63
Sep 21 07:09:06 web1 sshd\[18932\]: Failed password for invalid user rb from 101.207.134.63 port 19049 ssh2
Sep 21 07:12:12 web1 sshd\[19220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.207.134.63  user=root
Sep 21 07:12:14 web1 sshd\[19220\]: Failed password for root from 101.207.134.63 port 31376 ssh2
2019-09-22 01:16:23

Recently Reported IPs

104.18.4.15 104.18.13.249 104.18.4.122 104.18.4.154
104.18.64.40 104.18.64.67 104.18.64.82 104.18.69.52
104.18.13.251 104.18.65.67 104.18.7.101 104.18.65.228
104.18.65.40 104.18.7.139 104.18.7.148 104.18.7.137
104.18.7.140 104.18.7.14 104.18.7.169 104.18.7.176