Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.50.120 attack
*** Phishing website that camouflaged Amazon.com.
(redirect from)
https://subscriber.jglboots.com/
domain: subscriber.jglboots.com
IP v6 address: 2606:4700:3037::6812:3378 / 2606:4700:3033::6812:3278
IP v4 address: 104.18.50.120 / 104.18.51.120
location: USA
hosting: Cloudflare, Inc
web: https://www.cloudflare.com/abuse
abuse contact: abuse@cloudflare.com, abuse+law@cloudflare.com, rir@cloudflare.com
(redirect to)
https://counts-pontis-name-flare-and-safty.telemagico.com/
domain: counts-pontis-name-flare-and-safty.telemagico.com
IP v6 address: 2606:4700:3030::6818:62f1 / 2606:4700:3033::6818:63f1
IP v4 address: 104.24.99.241 / 104.24.98.241
location: USA
hosting: Cloudflare, Inc
web: https://www.cloudflare.com/abuse
abuse contact: abuse@cloudflare.com, abuse+law@cloudflare.com, rir@cloudflare.com
2020-05-04 03:15:46
104.18.54.70 spam
Used undred times per day for SPAM, PHISHING, SCAM and SEXE on STOLLEN list we don't know where without our agreement, as usual with LIERS and ROBERS !
Especially by namecheap.com with creatensend.com ?
https://www.mywot.com/scorecard/creatensend.com
https://www.mywot.com/scorecard/namecheap.com
Or uniregistry.com with casinovips.com ?
https://www.mywot.com/scorecard/casinovips.com
https://www.mywot.com/scorecard/uniregistry.com
And the same few hours before...
By GoDaddy.com, une autre SOUS MERDE adepte d'ESCROCS commebonusmasters.com...
https://www.mywot.com/scorecard/bonusmasters.com
https://www.mywot.com/scorecard/godaddy.com
2020-02-20 05:28:25
104.18.53.191 attack
*** Phishing website that camouflaged Google.
https://google-chrome.doysstv.com/?index
2020-01-04 20:34:01
104.18.52.191 attackspambots
*** Phishing website that camouflaged Google.
https://google-chrome.doysstv.com/?index
2020-01-04 18:36:35
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.5.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.5.61.			IN	A

;; AUTHORITY SECTION:
.			190	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 18:11:46 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 61.5.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.5.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.126.65.175 attack
Unauthorized connection attempt detected from IP address 118.126.65.175 to port 22 [T]
2020-01-20 07:47:09
1.52.156.100 attackbots
Unauthorized connection attempt detected from IP address 1.52.156.100 to port 23 [J]
2020-01-20 07:37:34
222.221.91.153 attackbots
Unauthorized connection attempt detected from IP address 222.221.91.153 to port 23 [J]
2020-01-20 07:22:21
222.43.87.234 attackspam
Unauthorized connection attempt detected from IP address 222.43.87.234 to port 23 [J]
2020-01-20 07:23:00
222.186.180.130 attackbotsspam
Jan 20 05:07:01 areeb-Workstation sshd[13738]: Failed password for root from 222.186.180.130 port 26887 ssh2
Jan 20 05:07:05 areeb-Workstation sshd[13738]: Failed password for root from 222.186.180.130 port 26887 ssh2
...
2020-01-20 07:38:40
112.27.187.97 attack
Unauthorized connection attempt detected from IP address 112.27.187.97 to port 23 [T]
2020-01-20 07:31:01
1.69.74.219 attackbots
Unauthorized connection attempt detected from IP address 1.69.74.219 to port 23 [J]
2020-01-20 07:21:05
124.128.157.147 attackbots
Unauthorized connection attempt detected from IP address 124.128.157.147 to port 1433 [T]
2020-01-20 07:44:53
212.19.6.71 attack
Unauthorized connection attempt detected from IP address 212.19.6.71 to port 23 [T]
2020-01-20 07:40:53
183.80.89.87 attackbotsspam
Unauthorized connection attempt detected from IP address 183.80.89.87 to port 23 [T]
2020-01-20 07:26:11
118.193.31.182 attackbots
Unauthorized connection attempt detected from IP address 118.193.31.182 to port 8800 [J]
2020-01-20 07:10:16
117.50.119.110 attackspam
Unauthorized connection attempt detected from IP address 117.50.119.110 to port 1433 [T]
2020-01-20 07:11:21
181.211.13.51 attackspam
Unauthorized connection attempt detected from IP address 181.211.13.51 to port 445 [T]
2020-01-20 07:27:17
115.238.48.116 attackspam
Unauthorized connection attempt detected from IP address 115.238.48.116 to port 2220 [J]
2020-01-20 07:11:42
157.230.128.195 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-20 07:27:51

Recently Reported IPs

104.18.5.59 104.18.5.63 104.18.5.64 104.18.5.88
104.18.5.95 104.18.5.97 104.18.59.63 104.18.6.101
104.18.6.128 104.18.6.137 104.18.6.14 104.18.6.140
104.18.6.148 104.18.6.168 104.18.6.169 104.18.6.172
104.18.6.177 104.18.6.178 104.18.6.18 104.18.6.187