Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.41.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.41.85.			IN	A

;; AUTHORITY SECTION:
.			419	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051902 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 20 11:41:10 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 85.41.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.41.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.216.64.198 attackspambots
Jun 18 10:35:57 mail.srvfarm.net postfix/smtpd[1392687]: warning: unknown[186.216.64.198]: SASL PLAIN authentication failed: 
Jun 18 10:35:57 mail.srvfarm.net postfix/smtpd[1392687]: lost connection after AUTH from unknown[186.216.64.198]
Jun 18 10:42:09 mail.srvfarm.net postfix/smtpd[1388355]: warning: unknown[186.216.64.198]: SASL PLAIN authentication failed: 
Jun 18 10:42:10 mail.srvfarm.net postfix/smtpd[1388355]: lost connection after AUTH from unknown[186.216.64.198]
Jun 18 10:43:16 mail.srvfarm.net postfix/smtpd[1388906]: warning: unknown[186.216.64.198]: SASL PLAIN authentication failed:
2020-06-19 04:30:32
195.117.135.214 attack
Jun 18 10:21:25 mail.srvfarm.net postfix/smtps/smtpd[1383618]: warning: unknown[195.117.135.214]: SASL PLAIN authentication failed: 
Jun 18 10:21:25 mail.srvfarm.net postfix/smtps/smtpd[1383618]: lost connection after AUTH from unknown[195.117.135.214]
Jun 18 10:25:17 mail.srvfarm.net postfix/smtpd[1386168]: warning: unknown[195.117.135.214]: SASL PLAIN authentication failed: 
Jun 18 10:25:17 mail.srvfarm.net postfix/smtpd[1386168]: lost connection after AUTH from unknown[195.117.135.214]
Jun 18 10:27:24 mail.srvfarm.net postfix/submission/smtpd[1382606]: lost connection after EHLO from unknown[195.117.135.214]
2020-06-19 04:28:53
129.213.86.27 attackspambots
2020-05-05T01:28:16.060Z CLOSE host=129.213.86.27 port=42248 fd=4 time=20.017 bytes=15
...
2020-06-19 04:11:29
47.240.72.60 attackbots
[Sun Dec 29 14:29:48.726738 2019] [access_compat:error] [pid 6396] [client 47.240.72.60:55726] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2020-06-19 03:55:34
159.203.102.122 attackbotsspam
Jun 18 19:06:55 vps639187 sshd\[16398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.102.122  user=root
Jun 18 19:06:56 vps639187 sshd\[16398\]: Failed password for root from 159.203.102.122 port 44630 ssh2
Jun 18 19:10:29 vps639187 sshd\[16455\]: Invalid user gw from 159.203.102.122 port 40238
Jun 18 19:10:29 vps639187 sshd\[16455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.102.122
...
2020-06-19 04:18:47
140.143.198.182 attackbots
Brute-force attempt banned
2020-06-19 03:50:56
47.240.81.171 attackbotsspam
[Tue Feb 18 02:37:19.633176 2020] [access_compat:error] [pid 17476] [client 47.240.81.171:40580] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2020-06-19 03:54:00
46.243.221.63 attackspambots
[Wed Oct 23 20:34:08.786690 2019] [access_compat:error] [pid 22016] [client 46.243.221.63:56047] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php, referer: https://lukegirvin.co.uk/
...
2020-06-19 04:25:57
47.113.225.249 attackspam
[Sat Feb 08 21:07:28.620745 2020] [access_compat:error] [pid 1755] [client 47.113.225.249:58932] AH01797: client denied by server configuration: /var/www/html/josh/admin
...
2020-06-19 04:07:27
154.118.173.102 attackbots
prod6
...
2020-06-19 04:10:31
13.232.159.238 attack
2020-04-16T03:02:53.906Z CLOSE host=13.232.159.238 port=23305 fd=4 time=20.009 bytes=6
...
2020-06-19 04:08:52
13.95.130.2 attackspambots
2019-11-11T01:48:11.982Z CLOSE host=13.95.130.2 port=63090 fd=4 time=20.007 bytes=14
...
2020-06-19 03:56:03
13.81.249.225 attackspam
2019-11-26T23:41:33.677Z CLOSE host=13.81.249.225 port=38874 fd=4 time=30.020 bytes=25
...
2020-06-19 03:58:48
193.160.64.129 attackspambots
Mar 18 15:29:10 mercury wordpress(lukegirvin.co.uk)[12644]: XML-RPC authentication failure for luke from 193.160.64.129
...
2020-06-19 04:26:24
194.181.228.90 attackbots
Mar 29 11:00:32 mercury wordpress(www.learnargentinianspanish.com)[15934]: XML-RPC authentication failure for josh from 194.181.228.90
...
2020-06-19 04:13:17

Recently Reported IPs

104.18.41.84 104.18.41.88 104.18.41.9 104.18.41.93
104.18.41.94 104.18.42.10 185.33.236.82 104.18.42.101
104.18.42.103 104.18.42.105 104.18.42.110 104.18.42.111
104.18.42.114 104.18.42.116 93.245.157.169 104.18.42.12
104.18.42.120 104.18.42.121 104.18.42.122 104.18.42.125