Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.40.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.40.161.			IN	A

;; AUTHORITY SECTION:
.			413	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 05:31:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 161.40.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.40.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
221.226.58.102 attackbots
Jun 13 06:11:15 pornomens sshd\[19022\]: Invalid user ben from 221.226.58.102 port 55466
Jun 13 06:11:15 pornomens sshd\[19022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.58.102
Jun 13 06:11:17 pornomens sshd\[19022\]: Failed password for invalid user ben from 221.226.58.102 port 55466 ssh2
...
2020-06-13 12:47:44
190.210.238.77 attackspambots
Jun 13 06:05:26 abendstille sshd\[22329\]: Invalid user file from 190.210.238.77
Jun 13 06:05:26 abendstille sshd\[22329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.238.77
Jun 13 06:05:28 abendstille sshd\[22329\]: Failed password for invalid user file from 190.210.238.77 port 60978 ssh2
Jun 13 06:11:30 abendstille sshd\[28214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.238.77  user=root
Jun 13 06:11:32 abendstille sshd\[28214\]: Failed password for root from 190.210.238.77 port 33415 ssh2
...
2020-06-13 12:31:48
162.62.29.207 attack
Jun 12 18:36:51 web1 sshd\[26482\]: Invalid user ftpusr from 162.62.29.207
Jun 12 18:36:51 web1 sshd\[26482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.62.29.207
Jun 12 18:36:53 web1 sshd\[26482\]: Failed password for invalid user ftpusr from 162.62.29.207 port 55474 ssh2
Jun 12 18:42:00 web1 sshd\[27170\]: Invalid user jira from 162.62.29.207
Jun 12 18:42:00 web1 sshd\[27170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.62.29.207
2020-06-13 13:05:14
190.85.145.162 attackspam
2020-06-13T06:08:15.013713sd-86998 sshd[37334]: Invalid user temp123 from 190.85.145.162 port 53494
2020-06-13T06:08:15.019178sd-86998 sshd[37334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.145.162
2020-06-13T06:08:15.013713sd-86998 sshd[37334]: Invalid user temp123 from 190.85.145.162 port 53494
2020-06-13T06:08:16.443451sd-86998 sshd[37334]: Failed password for invalid user temp123 from 190.85.145.162 port 53494 ssh2
2020-06-13T06:11:34.899531sd-86998 sshd[37726]: Invalid user xiewenjing from 190.85.145.162 port 39180
...
2020-06-13 12:30:12
193.178.131.133 attack
Jun 13 06:01:05 Ubuntu-1404-trusty-64-minimal sshd\[20632\]: Invalid user admin from 193.178.131.133
Jun 13 06:01:05 Ubuntu-1404-trusty-64-minimal sshd\[20632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.178.131.133
Jun 13 06:01:07 Ubuntu-1404-trusty-64-minimal sshd\[20632\]: Failed password for invalid user admin from 193.178.131.133 port 36811 ssh2
Jun 13 06:15:15 Ubuntu-1404-trusty-64-minimal sshd\[25144\]: Invalid user zachary from 193.178.131.133
Jun 13 06:15:15 Ubuntu-1404-trusty-64-minimal sshd\[25144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.178.131.133
2020-06-13 12:55:43
118.25.142.138 attack
2020-06-13T04:31:59.413469shield sshd\[11595\]: Invalid user noob123 from 118.25.142.138 port 41960
2020-06-13T04:31:59.417372shield sshd\[11595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.142.138
2020-06-13T04:32:01.670862shield sshd\[11595\]: Failed password for invalid user noob123 from 118.25.142.138 port 41960 ssh2
2020-06-13T04:32:33.751595shield sshd\[12075\]: Invalid user RCadmin from 118.25.142.138 port 45384
2020-06-13T04:32:33.755200shield sshd\[12075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.142.138
2020-06-13 12:40:38
134.122.96.20 attackspambots
Jun 13 06:39:57 piServer sshd[8130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20 
Jun 13 06:39:58 piServer sshd[8130]: Failed password for invalid user Asus_123 from 134.122.96.20 port 41640 ssh2
Jun 13 06:43:28 piServer sshd[8433]: Failed password for root from 134.122.96.20 port 42838 ssh2
...
2020-06-13 12:50:42
103.44.50.133 attackspambots
Automatic report - Banned IP Access
2020-06-13 13:01:20
119.176.78.254 attack
Automatic report - Port Scan Attack
2020-06-13 12:37:39
188.165.169.238 attackbotsspam
2020-06-13T04:39:05.944318shield sshd\[14941\]: Invalid user qwk from 188.165.169.238 port 38816
2020-06-13T04:39:05.948033shield sshd\[14941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip238.ip-188-165-169.eu
2020-06-13T04:39:07.681014shield sshd\[14941\]: Failed password for invalid user qwk from 188.165.169.238 port 38816 ssh2
2020-06-13T04:42:23.475478shield sshd\[15822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip238.ip-188-165-169.eu  user=root
2020-06-13T04:42:25.729039shield sshd\[15822\]: Failed password for root from 188.165.169.238 port 40346 ssh2
2020-06-13 12:46:12
61.223.161.225 attackspambots
Port probing on unauthorized port 23
2020-06-13 13:07:14
82.65.23.62 attackbotsspam
$f2bV_matches
2020-06-13 12:35:26
222.186.52.39 attackspam
$f2bV_matches
2020-06-13 12:49:31
1.6.182.218 attackbotsspam
Jun 13 07:54:18 journals sshd\[124282\]: Invalid user solr from 1.6.182.218
Jun 13 07:54:18 journals sshd\[124282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.6.182.218
Jun 13 07:54:20 journals sshd\[124282\]: Failed password for invalid user solr from 1.6.182.218 port 34684 ssh2
Jun 13 07:58:09 journals sshd\[125381\]: Invalid user shm from 1.6.182.218
Jun 13 07:58:09 journals sshd\[125381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.6.182.218
...
2020-06-13 13:02:54
211.24.100.128 attackspambots
Jun 12 18:51:41 kapalua sshd\[32206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.100.128  user=root
Jun 12 18:51:43 kapalua sshd\[32206\]: Failed password for root from 211.24.100.128 port 50058 ssh2
Jun 12 18:55:49 kapalua sshd\[32705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.100.128  user=root
Jun 12 18:55:51 kapalua sshd\[32705\]: Failed password for root from 211.24.100.128 port 51380 ssh2
Jun 12 18:59:49 kapalua sshd\[636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.100.128  user=root
2020-06-13 13:10:51

Recently Reported IPs

104.18.40.16 104.18.40.166 104.18.40.176 104.18.40.177
104.18.40.179 104.18.40.182 104.18.40.183 104.18.40.192
104.18.40.194 104.18.40.195 104.18.40.198 104.18.40.20
104.18.40.200 104.18.40.203 104.18.40.208 104.18.40.210
104.18.40.211 104.18.40.213 104.18.40.218 104.18.40.231