Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.4.135 spam
Phishing
2023-06-15 05:17:06
104.18.44.158 attackbots
RUSSIAN SCAMMERS !
2020-04-20 18:13:49
104.18.47.6 attack
Brute force attack against VPN service
2020-04-01 01:18:33
104.18.48.6 attackspam
web spam and scam
2019-07-10 18:30:37
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.4.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10878
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.4.161.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 05:49:14 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 161.4.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.4.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
71.105.48.7 attackbotsspam
Attempted connection to port 23.
2020-09-05 19:09:23
95.216.12.234 attackbots
SP-Scan 80:3786 detected 2020.09.04 18:57:22
blocked until 2020.10.24 12:00:09
2020-09-05 18:29:03
198.100.149.77 attackspambots
Tried to login in WordPress
2020-09-05 19:01:33
112.85.42.237 attack
Sep  4 20:16:39 propaganda sshd[11105]: Connection from 112.85.42.237 port 39051 on 10.0.0.161 port 22 rdomain ""
Sep  4 20:16:42 propaganda sshd[11105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Sep  4 20:16:44 propaganda sshd[11105]: Failed password for root from 112.85.42.237 port 39051 ssh2
2020-09-05 18:53:26
14.207.82.167 attackbots
Attempted connection to port 445.
2020-09-05 18:39:10
14.127.74.87 attackbotsspam
firewall-block, port(s): 445/tcp
2020-09-05 19:00:14
201.236.79.18 attackspambots
Unauthorized connection attempt from IP address 201.236.79.18 on Port 445(SMB)
2020-09-05 18:34:10
52.142.164.243 attackspambots
\[2020-09-05 12:23:42\] SECURITY\[18662\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-05T12:23:42.874+0200",Severity="Error",Service="SIP",EventVersion="2",AccountID="5797",SessionID="0x7f62b4df0868",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/52.142.164.243/57927",Challenge="7866f636",ReceivedChallenge="7866f636",ReceivedHash="7fb147216b18681596d5f40e986e99cc"
\[2020-09-05 12:25:09\] SECURITY\[18662\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-05T12:25:09.640+0200",Severity="Error",Service="SIP",EventVersion="2",AccountID="5799",SessionID="0x7f62b4e94788",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/52.142.164.243/60301",Challenge="7e6509c0",ReceivedChallenge="7e6509c0",ReceivedHash="9ad0f57d597443341120d6ac06f749a0"
\[2020-09-05 12:25:52\] SECURITY\[18662\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-05T12:25:52.061+0200",Severity="Error",Service="SIP",EventVersion="
...
2020-09-05 19:10:35
129.78.110.128 attackspam
GET / HTTP/1.1 403 0 "-" "Mozilla/5.0 zgrab/0.x"
2020-09-05 19:11:30
198.15.246.34 attackspam
Attempted connection to port 10347.
2020-09-05 19:14:13
211.20.181.113 attackbotsspam
Sep  4 **REMOVED** dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 4 secs\): user=\, method=PLAIN, rip=211.20.181.113, lip=**REMOVED**, TLS: Disconnected, session=\
Sep  4 **REMOVED** dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=211.20.181.113, lip=**REMOVED**, TLS: Disconnected, session=\
Sep  5 **REMOVED** dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 5 secs\): user=\, method=PLAIN, rip=211.20.181.113, lip=**REMOVED**, TLS, session=\
2020-09-05 19:05:47
61.221.225.143 attack
Microsoft SQL Server User Authentication Brute Force Attempt , PTR: 61-221-225-143.HINET-IP.hinet.net.
2020-09-05 18:37:08
114.143.115.98 attackspam
Unauthorized connection attempt from IP address 114.143.115.98 on Port 445(SMB)
2020-09-05 18:48:44
77.65.17.2 attack
Invalid user sdtd from 77.65.17.2 port 35384
2020-09-05 18:52:08
167.172.38.238 attackspambots
2020-09-05T10:54:50.256705vps1033 sshd[854]: Invalid user tunnel from 167.172.38.238 port 35160
2020-09-05T10:54:50.261597vps1033 sshd[854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.38.238
2020-09-05T10:54:50.256705vps1033 sshd[854]: Invalid user tunnel from 167.172.38.238 port 35160
2020-09-05T10:54:52.107146vps1033 sshd[854]: Failed password for invalid user tunnel from 167.172.38.238 port 35160 ssh2
2020-09-05T10:58:19.422649vps1033 sshd[8228]: Invalid user sn from 167.172.38.238 port 39286
...
2020-09-05 19:08:26

Recently Reported IPs

104.18.4.13 104.18.4.164 104.18.4.178 104.18.4.180
104.18.4.183 104.18.4.187 104.18.4.188 104.18.4.189
104.18.4.193 104.18.4.196 104.18.4.200 104.18.4.207
104.18.4.216 104.18.4.22 104.18.4.231 104.18.4.35
104.18.4.52 104.18.4.56 193.254.179.10 104.18.4.65