Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.4.135 spam
Phishing
2023-06-15 05:17:06
104.18.44.158 attackbots
RUSSIAN SCAMMERS !
2020-04-20 18:13:49
104.18.47.6 attack
Brute force attack against VPN service
2020-04-01 01:18:33
104.18.48.6 attackspam
web spam and scam
2019-07-10 18:30:37
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.4.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.4.2.			IN	A

;; AUTHORITY SECTION:
.			265	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:54:09 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 2.4.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.4.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.99.13.90 attackspam
167.99.13.90 - - [23/Jul/2020:13:48:13 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.13.90 - - [23/Jul/2020:14:01:02 +0200] "POST /xmlrpc.php HTTP/1.1" 403 16468 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-23 23:47:16
117.216.179.148 attack
1595505625 - 07/23/2020 14:00:25 Host: 117.216.179.148/117.216.179.148 Port: 445 TCP Blocked
2020-07-24 00:29:06
124.239.148.63 attackbotsspam
2020-07-23T13:59:04.290297abusebot-6.cloudsearch.cf sshd[32543]: Invalid user www from 124.239.148.63 port 49205
2020-07-23T13:59:04.294630abusebot-6.cloudsearch.cf sshd[32543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.148.63
2020-07-23T13:59:04.290297abusebot-6.cloudsearch.cf sshd[32543]: Invalid user www from 124.239.148.63 port 49205
2020-07-23T13:59:06.193822abusebot-6.cloudsearch.cf sshd[32543]: Failed password for invalid user www from 124.239.148.63 port 49205 ssh2
2020-07-23T14:08:41.752637abusebot-6.cloudsearch.cf sshd[32669]: Invalid user claire from 124.239.148.63 port 27123
2020-07-23T14:08:41.759592abusebot-6.cloudsearch.cf sshd[32669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.148.63
2020-07-23T14:08:41.752637abusebot-6.cloudsearch.cf sshd[32669]: Invalid user claire from 124.239.148.63 port 27123
2020-07-23T14:08:43.869590abusebot-6.cloudsearch.cf sshd[32669]: Fai
...
2020-07-23 23:53:53
62.57.227.12 attackspam
Jul 23 15:59:43 gospond sshd[29592]: Invalid user py from 62.57.227.12 port 36846
Jul 23 15:59:44 gospond sshd[29592]: Failed password for invalid user py from 62.57.227.12 port 36846 ssh2
Jul 23 16:04:01 gospond sshd[29677]: Invalid user alberto from 62.57.227.12 port 50846
...
2020-07-24 00:12:12
140.143.248.32 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-07-24 00:16:01
37.187.113.144 attack
2020-07-23T16:45:24.622557ns386461 sshd\[8515\]: Invalid user dispatch from 37.187.113.144 port 53044
2020-07-23T16:45:24.627496ns386461 sshd\[8515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dedi-max.ovh
2020-07-23T16:45:26.838364ns386461 sshd\[8515\]: Failed password for invalid user dispatch from 37.187.113.144 port 53044 ssh2
2020-07-23T16:55:11.030318ns386461 sshd\[16965\]: Invalid user perez from 37.187.113.144 port 48192
2020-07-23T16:55:11.034949ns386461 sshd\[16965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dedi-max.ovh
...
2020-07-24 00:19:40
222.186.173.183 attackspambots
Jul 23 08:56:37 dignus sshd[9574]: Failed password for root from 222.186.173.183 port 19246 ssh2
Jul 23 08:56:39 dignus sshd[9574]: Failed password for root from 222.186.173.183 port 19246 ssh2
Jul 23 08:56:43 dignus sshd[9574]: Failed password for root from 222.186.173.183 port 19246 ssh2
Jul 23 08:56:47 dignus sshd[9574]: Failed password for root from 222.186.173.183 port 19246 ssh2
Jul 23 08:56:50 dignus sshd[9574]: Failed password for root from 222.186.173.183 port 19246 ssh2
...
2020-07-24 00:17:12
51.68.122.147 attackspam
Jul 23 09:43:40 ny01 sshd[12718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.147
Jul 23 09:43:42 ny01 sshd[12718]: Failed password for invalid user zhangh from 51.68.122.147 port 52196 ssh2
Jul 23 09:48:10 ny01 sshd[13240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.147
2020-07-23 23:50:13
153.126.152.153 attackspam
Jul 20 02:23:59 olgosrv01 sshd[28257]: Invalid user jms from 153.126.152.153
Jul 20 02:24:02 olgosrv01 sshd[28257]: Failed password for invalid user jms from 153.126.152.153 port 32966 ssh2
Jul 20 02:24:02 olgosrv01 sshd[28257]: Received disconnect from 153.126.152.153: 11: Bye Bye [preauth]
Jul 20 02:34:23 olgosrv01 sshd[29015]: Invalid user tony from 153.126.152.153
Jul 20 02:34:24 olgosrv01 sshd[29015]: Failed password for invalid user tony from 153.126.152.153 port 42948 ssh2
Jul 20 02:34:25 olgosrv01 sshd[29015]: Received disconnect from 153.126.152.153: 11: Bye Bye [preauth]
Jul 20 02:38:50 olgosrv01 sshd[29302]: Invalid user david from 153.126.152.153
Jul 20 02:38:52 olgosrv01 sshd[29302]: Failed password for invalid user david from 153.126.152.153 port 33046 ssh2
Jul 20 02:38:52 olgosrv01 sshd[29302]: Received disconnect from 153.126.152.153: 11: Bye Bye [preauth]
Jul 20 02:43:03 olgosrv01 sshd[29614]: Invalid user anderson from 153.126.152.153
Jul 20 02:43:05 o........
-------------------------------
2020-07-24 00:13:14
158.181.184.35 attack
1595505650 - 07/23/2020 14:00:50 Host: 158.181.184.35/158.181.184.35 Port: 445 TCP Blocked
2020-07-23 23:59:06
36.77.105.156 attackspambots
1595517810 - 07/23/2020 17:23:30 Host: 36.77.105.156/36.77.105.156 Port: 445 TCP Blocked
2020-07-24 00:14:20
192.3.247.10 attack
2020-07-23T15:55:35+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-07-24 00:25:18
209.127.127.5 attack
(From jessika.bean@yahoo.com) This Google doc exposes how this scamdemic is part of a bigger plan to crush your business and keep it closed or semi-operational (with heavy rescritions) while big corporations remain open without consequences. This Covid lie has ruined many peoples lives and businesses and is all done on purpose to bring about the One World Order. It goes much deeper than this but the purpose of this doc is to expose the evil and wickedness that works in the background to ruin peoples lives. So feel free to share this message with friends and family. No need to reply to the email i provided above as its not registered. But this information will tell you everything you need to know. https://docs.google.com/document/d/14MuVe_anmrcDQl4sZhDqzhQy0Pbhrx9A/edit. In case the document is taken down, here is a backup source https://fakecovidscam.com
2020-07-24 00:13:44
184.105.139.123 attack
 TCP (SYN) 184.105.139.123:35474 -> port 80, len 44
2020-07-24 00:17:34
193.112.48.79 attackspam
$f2bV_matches
2020-07-23 23:55:00

Recently Reported IPs

104.21.65.4 104.18.4.195 104.18.4.194 104.18.4.203
104.18.4.217 104.18.4.226 104.18.4.235 104.18.4.204
104.18.4.228 104.18.4.239 104.18.4.215 104.18.4.244
104.18.4.242 104.18.4.230 104.21.65.44 104.18.4.28
104.18.4.46 104.18.4.47 104.18.4.62 104.18.4.58