Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.50.120 attack
*** Phishing website that camouflaged Amazon.com.
(redirect from)
https://subscriber.jglboots.com/
domain: subscriber.jglboots.com
IP v6 address: 2606:4700:3037::6812:3378 / 2606:4700:3033::6812:3278
IP v4 address: 104.18.50.120 / 104.18.51.120
location: USA
hosting: Cloudflare, Inc
web: https://www.cloudflare.com/abuse
abuse contact: abuse@cloudflare.com, abuse+law@cloudflare.com, rir@cloudflare.com
(redirect to)
https://counts-pontis-name-flare-and-safty.telemagico.com/
domain: counts-pontis-name-flare-and-safty.telemagico.com
IP v6 address: 2606:4700:3030::6818:62f1 / 2606:4700:3033::6818:63f1
IP v4 address: 104.24.99.241 / 104.24.98.241
location: USA
hosting: Cloudflare, Inc
web: https://www.cloudflare.com/abuse
abuse contact: abuse@cloudflare.com, abuse+law@cloudflare.com, rir@cloudflare.com
2020-05-04 03:15:46
104.18.54.70 spam
Used undred times per day for SPAM, PHISHING, SCAM and SEXE on STOLLEN list we don't know where without our agreement, as usual with LIERS and ROBERS !
Especially by namecheap.com with creatensend.com ?
https://www.mywot.com/scorecard/creatensend.com
https://www.mywot.com/scorecard/namecheap.com
Or uniregistry.com with casinovips.com ?
https://www.mywot.com/scorecard/casinovips.com
https://www.mywot.com/scorecard/uniregistry.com
And the same few hours before...
By GoDaddy.com, une autre SOUS MERDE adepte d'ESCROCS commebonusmasters.com...
https://www.mywot.com/scorecard/bonusmasters.com
https://www.mywot.com/scorecard/godaddy.com
2020-02-20 05:28:25
104.18.53.191 attack
*** Phishing website that camouflaged Google.
https://google-chrome.doysstv.com/?index
2020-01-04 20:34:01
104.18.52.191 attackspambots
*** Phishing website that camouflaged Google.
https://google-chrome.doysstv.com/?index
2020-01-04 18:36:35
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.5.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9410
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.5.53.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 01:32:02 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 53.5.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.5.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.120.227.134 attack
Jun 22 09:23:06 piServer sshd[8285]: Failed password for root from 59.120.227.134 port 34676 ssh2
Jun 22 09:26:52 piServer sshd[8573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.227.134 
Jun 22 09:26:54 piServer sshd[8573]: Failed password for invalid user net from 59.120.227.134 port 35578 ssh2
...
2020-06-22 17:12:33
106.54.205.236 attack
Jun 22 06:14:38 piServer sshd[19443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.205.236 
Jun 22 06:14:40 piServer sshd[19443]: Failed password for invalid user tommy from 106.54.205.236 port 35810 ssh2
Jun 22 06:18:25 piServer sshd[19916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.205.236 
...
2020-06-22 17:36:16
138.128.14.137 attack
7,20-07/08 [bc04/m132] PostRequest-Spammer scoring: stockholm
2020-06-22 17:31:30
139.167.120.251 attack
1592797798 - 06/22/2020 05:49:58 Host: 139.167.120.251/139.167.120.251 Port: 445 TCP Blocked
2020-06-22 17:09:46
152.136.207.121 attackspambots
firewall-block, port(s): 16788/tcp
2020-06-22 16:58:12
88.243.232.91 attackspam
firewall-block, port(s): 445/tcp
2020-06-22 17:11:03
113.141.70.91 attackspam
IP 113.141.70.91 attacked honeypot on port: 1433 at 6/21/2020 8:50:11 PM
2020-06-22 17:02:04
178.16.175.146 attackspam
2020-06-22T09:42:45.473261afi-git.jinr.ru sshd[9320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.16.175.146
2020-06-22T09:42:45.469918afi-git.jinr.ru sshd[9320]: Invalid user cheng from 178.16.175.146 port 22918
2020-06-22T09:42:47.112013afi-git.jinr.ru sshd[9320]: Failed password for invalid user cheng from 178.16.175.146 port 22918 ssh2
2020-06-22T09:45:58.866936afi-git.jinr.ru sshd[10113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.16.175.146  user=root
2020-06-22T09:46:00.666315afi-git.jinr.ru sshd[10113]: Failed password for root from 178.16.175.146 port 23907 ssh2
...
2020-06-22 17:09:29
185.232.30.130 attackspam
Jun 22 10:29:31 debian-2gb-nbg1-2 kernel: \[15073247.255484\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.232.30.130 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=21253 PROTO=TCP SPT=48311 DPT=5389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-22 17:08:10
200.88.48.99 attackbotsspam
Invalid user zhanghw from 200.88.48.99 port 48132
2020-06-22 17:15:07
138.197.152.148 attack
 TCP (SYN) 138.197.152.148:56318 -> port 19579, len 44
2020-06-22 16:59:10
187.11.242.196 attack
Jun 22 11:08:53 ns3164893 sshd[651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.11.242.196
Jun 22 11:08:55 ns3164893 sshd[651]: Failed password for invalid user nikhil from 187.11.242.196 port 42526 ssh2
...
2020-06-22 17:24:47
91.134.167.236 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-22T07:24:43Z and 2020-06-22T07:46:31Z
2020-06-22 17:26:43
194.26.29.33 attack
Jun 22 11:28:12 debian-2gb-nbg1-2 kernel: \[15076768.798094\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.33 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=55896 PROTO=TCP SPT=46312 DPT=134 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-22 17:36:38
79.124.62.118 attackbotsspam
[H1.VM4] Blocked by UFW
2020-06-22 17:34:02

Recently Reported IPs

104.18.5.206 104.18.5.6 104.18.5.68 104.18.6.13
104.18.6.159 104.18.6.164 104.18.66.60 104.18.67.60
104.18.69.235 104.18.7.13 111.190.150.154 104.18.7.159
104.18.7.164 180.49.45.156 102.127.167.250 104.18.70.235
104.18.74.78 104.18.75.117 104.18.8.11 104.18.8.188