Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.50.120 attack
*** Phishing website that camouflaged Amazon.com.
(redirect from)
https://subscriber.jglboots.com/
domain: subscriber.jglboots.com
IP v6 address: 2606:4700:3037::6812:3378 / 2606:4700:3033::6812:3278
IP v4 address: 104.18.50.120 / 104.18.51.120
location: USA
hosting: Cloudflare, Inc
web: https://www.cloudflare.com/abuse
abuse contact: abuse@cloudflare.com, abuse+law@cloudflare.com, rir@cloudflare.com
(redirect to)
https://counts-pontis-name-flare-and-safty.telemagico.com/
domain: counts-pontis-name-flare-and-safty.telemagico.com
IP v6 address: 2606:4700:3030::6818:62f1 / 2606:4700:3033::6818:63f1
IP v4 address: 104.24.99.241 / 104.24.98.241
location: USA
hosting: Cloudflare, Inc
web: https://www.cloudflare.com/abuse
abuse contact: abuse@cloudflare.com, abuse+law@cloudflare.com, rir@cloudflare.com
2020-05-04 03:15:46
104.18.54.70 spam
Used undred times per day for SPAM, PHISHING, SCAM and SEXE on STOLLEN list we don't know where without our agreement, as usual with LIERS and ROBERS !
Especially by namecheap.com with creatensend.com ?
https://www.mywot.com/scorecard/creatensend.com
https://www.mywot.com/scorecard/namecheap.com
Or uniregistry.com with casinovips.com ?
https://www.mywot.com/scorecard/casinovips.com
https://www.mywot.com/scorecard/uniregistry.com
And the same few hours before...
By GoDaddy.com, une autre SOUS MERDE adepte d'ESCROCS commebonusmasters.com...
https://www.mywot.com/scorecard/bonusmasters.com
https://www.mywot.com/scorecard/godaddy.com
2020-02-20 05:28:25
104.18.53.191 attack
*** Phishing website that camouflaged Google.
https://google-chrome.doysstv.com/?index
2020-01-04 20:34:01
104.18.52.191 attackspambots
*** Phishing website that camouflaged Google.
https://google-chrome.doysstv.com/?index
2020-01-04 18:36:35
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.5.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.5.130.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 15:20:38 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 130.5.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.5.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.49.227.180 attack
Brute force blocker - service: dovecot1 - aantal: 25 - Tue Sep  4 07:50:11 2018
2020-09-25 15:16:00
31.40.90.39 attackspambots
445/tcp
[2020-09-24]1pkt
2020-09-25 15:12:59
144.217.126.189 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 144.217.126.189 (CA/Canada/ip189.ip-144-217-126.net): 5 in the last 3600 secs - Tue Sep  4 11:58:49 2018
2020-09-25 15:13:53
66.165.231.210 attack
[2020-09-25 02:43:42] NOTICE[1159][C-000015eb] chan_sip.c: Call from '' (66.165.231.210:58991) to extension '00442037691054' rejected because extension not found in context 'public'.
[2020-09-25 02:43:42] SECURITY[1198] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-25T02:43:42.503-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00442037691054",SessionID="0x7fcaa02d7a38",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/66.165.231.210/58991",ACLName="no_extension_match"
[2020-09-25 02:46:33] NOTICE[1159][C-000015ed] chan_sip.c: Call from '' (66.165.231.210:55500) to extension '00442037691054' rejected because extension not found in context 'public'.
[2020-09-25 02:46:33] SECURITY[1198] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-25T02:46:33.436-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00442037691054",SessionID="0x7fcaa0092e98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/6
...
2020-09-25 14:52:22
119.123.216.122 attackspambots
Brute force blocker - service: proftpd1 - aantal: 146 - Tue Sep  4 14:55:14 2018
2020-09-25 15:10:59
222.186.175.154 attack
Sep 25 08:55:35 minden010 sshd[1905]: Failed password for root from 222.186.175.154 port 15836 ssh2
Sep 25 08:55:38 minden010 sshd[1905]: Failed password for root from 222.186.175.154 port 15836 ssh2
Sep 25 08:55:41 minden010 sshd[1905]: Failed password for root from 222.186.175.154 port 15836 ssh2
Sep 25 08:55:47 minden010 sshd[1905]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 15836 ssh2 [preauth]
...
2020-09-25 14:57:50
159.65.85.131 attack
2020-09-25T06:49:15.934814dmca.cloudsearch.cf sshd[14723]: Invalid user psql from 159.65.85.131 port 43108
2020-09-25T06:49:15.940143dmca.cloudsearch.cf sshd[14723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.85.131
2020-09-25T06:49:15.934814dmca.cloudsearch.cf sshd[14723]: Invalid user psql from 159.65.85.131 port 43108
2020-09-25T06:49:18.564734dmca.cloudsearch.cf sshd[14723]: Failed password for invalid user psql from 159.65.85.131 port 43108 ssh2
2020-09-25T06:53:39.703744dmca.cloudsearch.cf sshd[14871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.85.131  user=root
2020-09-25T06:53:41.902178dmca.cloudsearch.cf sshd[14871]: Failed password for root from 159.65.85.131 port 50384 ssh2
2020-09-25T06:57:40.448496dmca.cloudsearch.cf sshd[15021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.85.131  user=root
2020-09-25T06:57:42.732203dmca
...
2020-09-25 15:13:14
193.33.1.6 attackspambots
Honeypot attack, port: 445, PTR: un-77-6.static.reseler.com.
2020-09-25 15:03:29
37.49.224.131 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 37.49.224.131 (NL/Netherlands/-): 5 in the last 3600 secs - Tue Sep  4 16:57:29 2018
2020-09-25 15:16:31
192.162.179.154 attack
Brute force attempt
2020-09-25 14:55:52
77.37.162.17 attackspam
Invalid user www from 77.37.162.17 port 42700
2020-09-25 15:04:57
36.65.47.203 attack
Brute force blocker - service: proftpd1, proftpd2 - aantal: 78 - Tue Sep  4 18:55:18 2018
2020-09-25 14:43:53
13.72.79.240 attackspambots
Scanning
2020-09-25 14:40:17
46.105.167.198 attackbots
Tried sshing with brute force.
2020-09-25 14:43:17
64.225.53.232 attackbots
Sep 25 07:30:16 ncomp sshd[27144]: Invalid user koha from 64.225.53.232 port 57758
Sep 25 07:30:16 ncomp sshd[27144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.53.232
Sep 25 07:30:16 ncomp sshd[27144]: Invalid user koha from 64.225.53.232 port 57758
Sep 25 07:30:18 ncomp sshd[27144]: Failed password for invalid user koha from 64.225.53.232 port 57758 ssh2
2020-09-25 14:52:37

Recently Reported IPs

104.18.5.121 104.18.5.135 104.18.5.137 104.18.5.138
104.18.5.140 104.18.5.152 104.18.5.175 104.18.5.179
104.18.5.18 104.18.5.191 104.18.5.220 104.18.5.236
185.41.43.36 104.18.5.241 104.18.5.243 104.18.5.247
104.18.5.250 104.18.5.251 104.18.5.27 104.18.5.39