Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.40.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.40.53.			IN	A

;; AUTHORITY SECTION:
.			356	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 267 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 05:32:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 53.40.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.40.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
210.212.145.125 attackbotsspam
Sep 24 15:36:25 vps691689 sshd[4040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.145.125
Sep 24 15:36:28 vps691689 sshd[4040]: Failed password for invalid user dp from 210.212.145.125 port 50716 ssh2
Sep 24 15:40:31 vps691689 sshd[4113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.145.125
...
2019-09-25 04:38:01
51.255.39.143 attackbots
$f2bV_matches_ltvn
2019-09-25 04:40:29
64.62.143.231 attack
Sep 24 14:35:17 ks10 sshd[12136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.62.143.231 
Sep 24 14:35:19 ks10 sshd[12136]: Failed password for invalid user ftpguest from 64.62.143.231 port 46506 ssh2
...
2019-09-25 04:35:50
203.186.57.191 attackspambots
Sep 24 10:46:41 tdfoods sshd\[18417\]: Invalid user west from 203.186.57.191
Sep 24 10:46:41 tdfoods sshd\[18417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203186057191.static.ctinets.com
Sep 24 10:46:43 tdfoods sshd\[18417\]: Failed password for invalid user west from 203.186.57.191 port 55508 ssh2
Sep 24 10:50:20 tdfoods sshd\[18711\]: Invalid user cody from 203.186.57.191
Sep 24 10:50:20 tdfoods sshd\[18711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203186057191.static.ctinets.com
2019-09-25 04:55:29
106.12.111.201 attackbots
Sep 24 04:38:28 lcdev sshd\[2561\]: Invalid user hplip from 106.12.111.201
Sep 24 04:38:28 lcdev sshd\[2561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.111.201
Sep 24 04:38:31 lcdev sshd\[2561\]: Failed password for invalid user hplip from 106.12.111.201 port 45294 ssh2
Sep 24 04:41:59 lcdev sshd\[2951\]: Invalid user oracle from 106.12.111.201
Sep 24 04:41:59 lcdev sshd\[2951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.111.201
2019-09-25 04:56:43
37.113.128.52 attackspam
2019-09-24T18:35:34.106390abusebot-6.cloudsearch.cf sshd\[8632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.113.128.52  user=lp
2019-09-25 04:43:17
144.217.91.86 attack
Sep 24 08:57:57 aiointranet sshd\[8494\]: Invalid user porno from 144.217.91.86
Sep 24 08:57:57 aiointranet sshd\[8494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.91.86
Sep 24 08:57:59 aiointranet sshd\[8494\]: Failed password for invalid user porno from 144.217.91.86 port 54964 ssh2
Sep 24 09:02:09 aiointranet sshd\[8790\]: Invalid user pi from 144.217.91.86
Sep 24 09:02:09 aiointranet sshd\[8790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.91.86
2019-09-25 04:31:26
159.203.182.127 attack
Invalid user gituser from 159.203.182.127 port 54169
2019-09-25 05:05:17
58.213.198.77 attackspambots
Sep 24 14:31:40 MainVPS sshd[27379]: Invalid user vonzant from 58.213.198.77 port 41328
Sep 24 14:31:40 MainVPS sshd[27379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.77
Sep 24 14:31:40 MainVPS sshd[27379]: Invalid user vonzant from 58.213.198.77 port 41328
Sep 24 14:31:42 MainVPS sshd[27379]: Failed password for invalid user vonzant from 58.213.198.77 port 41328 ssh2
Sep 24 14:34:46 MainVPS sshd[27577]: Invalid user rootme from 58.213.198.77 port 39400
...
2019-09-25 05:15:20
64.113.32.29 attackspambots
lust-auf-land.com 64.113.32.29 \[24/Sep/2019:21:57:04 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 509 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134"
www.lust-auf-land.com 64.113.32.29 \[24/Sep/2019:21:57:06 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 3777 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134"
2019-09-25 04:30:27
137.74.119.50 attack
Sep 24 15:38:51 rpi sshd[7963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.119.50 
Sep 24 15:38:54 rpi sshd[7963]: Failed password for invalid user cascinatriulzina123 from 137.74.119.50 port 60280 ssh2
2019-09-25 05:01:30
218.64.148.111 attackbotsspam
Sep 24 15:24:20 aat-srv002 sshd[23032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.64.148.111
Sep 24 15:24:22 aat-srv002 sshd[23032]: Failed password for invalid user user0 from 218.64.148.111 port 44583 ssh2
Sep 24 15:28:37 aat-srv002 sshd[23147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.64.148.111
Sep 24 15:28:39 aat-srv002 sshd[23147]: Failed password for invalid user scanner from 218.64.148.111 port 32994 ssh2
...
2019-09-25 04:40:52
2.50.165.139 attack
Unauthorized connection attempt from IP address 2.50.165.139 on Port 445(SMB)
2019-09-25 05:12:22
201.187.102.178 attackbots
Unauthorized connection attempt from IP address 201.187.102.178 on Port 445(SMB)
2019-09-25 05:13:54
106.13.140.110 attackspambots
Sep 24 02:48:37 php1 sshd\[17636\]: Invalid user rasello from 106.13.140.110
Sep 24 02:48:37 php1 sshd\[17636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.110
Sep 24 02:48:39 php1 sshd\[17636\]: Failed password for invalid user rasello from 106.13.140.110 port 34512 ssh2
Sep 24 02:52:56 php1 sshd\[17999\]: Invalid user oracle from 106.13.140.110
Sep 24 02:52:56 php1 sshd\[17999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.110
2019-09-25 04:47:33

Recently Reported IPs

104.18.40.41 104.18.40.57 104.18.40.59 104.18.40.6
104.18.40.62 104.18.40.70 104.18.40.72 104.18.40.73
104.18.40.74 104.18.40.78 104.18.40.79 104.18.40.8
104.18.40.83 104.18.40.84 104.18.40.87 104.18.40.88
104.18.40.89 104.18.40.99 104.18.41.100 104.18.41.104