Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.64.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45037
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.64.11.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 15:26:38 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 11.64.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.64.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.186.18.130 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/178.186.18.130/ 
 
 RU - 1H : (190)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12389 
 
 IP : 178.186.18.130 
 
 CIDR : 178.186.0.0/15 
 
 PREFIX COUNT : 2741 
 
 UNIQUE IP COUNT : 8699648 
 
 
 ATTACKS DETECTED ASN12389 :  
  1H - 2 
  3H - 9 
  6H - 16 
 12H - 44 
 24H - 96 
 
 DateTime : 2019-10-31 04:52:48 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-31 14:52:12
190.221.81.6 attack
Oct 31 07:33:49 sso sshd[6141]: Failed password for root from 190.221.81.6 port 56968 ssh2
...
2019-10-31 14:51:49
159.203.193.251 attackspam
4786/tcp 20839/tcp 59122/tcp...
[2019-09-12/10-31]35pkt,30pt.(tcp),1pt.(udp)
2019-10-31 15:09:58
43.254.16.253 attackspambots
X-DKIM-Failure: bodyhash_mismatch
Received: from mg1.eee.tw ([43.254.16.253])
	by mx145.antispamcloud.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
	(Exim 4.89)
	(envelope-from )
	id 1iQ0zJ-000QIH-8l
	for as@silk.com.sg; Thu, 31 Oct 2019 04:19:06 +0100
Received: from re34.cx901.com (re34.cx901.com [43.254.17.20])
	(using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by mg1.eee.tw (Postfix) with ESMTPS id 3BA13E010FE;
	Thu, 31 Oct 2019 11:18:41 +0800 (CST)
DKIM-Filter: OpenDKIM Filter v2.11.0 mg1.eee.tw 3BA13E010FE
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mg1.eee.tw;
	s=default; t=1572491921;
	bh=Nb0ZTMwsuXuBamK9CzRsFxbYzgl+iGvOm/ghvaZXHcQ=;
	h=Date:From:To:Subject:In-Reply-To:References:From;
	b=I11pp27PCr4ojkzUDKb3AxhIOo089d9NZke26JyttI0OcPMz2APst88MyPLK0dWfQ
	 PnTUCsudXSJgQ3sLdIkrC58HOyY6FCAFcAVsYI3C4llrd1Hm45+7jhSXxegiIBiJbQ
	 clMJrycCq+3VDX8eR0KqPqajNVuRLwqiabKy8JLY=
2019-10-31 15:00:30
95.19.192.122 attack
Lines containing failures of 95.19.192.122
Oct 27 14:50:27 shared02 sshd[24730]: Invalid user gq from 95.19.192.122 port 58300
Oct 27 14:50:27 shared02 sshd[24730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.19.192.122
Oct 27 14:50:29 shared02 sshd[24730]: Failed password for invalid user gq from 95.19.192.122 port 58300 ssh2
Oct 27 14:50:29 shared02 sshd[24730]: Received disconnect from 95.19.192.122 port 58300:11: Bye Bye [preauth]
Oct 27 14:50:29 shared02 sshd[24730]: Disconnected from invalid user gq 95.19.192.122 port 58300 [preauth]
Oct 28 14:54:29 shared02 sshd[17416]: Invalid user pao from 95.19.192.122 port 34670
Oct 28 14:54:29 shared02 sshd[17416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.19.192.122
Oct 28 14:54:31 shared02 sshd[17416]: Failed password for invalid user pao from 95.19.192.122 port 34670 ssh2
Oct 28 14:54:31 shared02 sshd[17416]: Received disconnect........
------------------------------
2019-10-31 14:54:15
94.21.243.204 attackbots
Oct 31 08:04:30 MK-Soft-Root2 sshd[17248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.21.243.204 
Oct 31 08:04:32 MK-Soft-Root2 sshd[17248]: Failed password for invalid user @system from 94.21.243.204 port 50906 ssh2
...
2019-10-31 15:10:31
222.186.180.223 attackspambots
10/31/2019-03:13:18.470881 222.186.180.223 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-31 15:14:03
51.68.123.192 attackspam
Oct 31 06:31:06 server sshd\[25270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-51-68-123.eu  user=root
Oct 31 06:31:08 server sshd\[25270\]: Failed password for root from 51.68.123.192 port 50630 ssh2
Oct 31 06:53:13 server sshd\[30599\]: Invalid user sylee from 51.68.123.192
Oct 31 06:53:13 server sshd\[30599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-51-68-123.eu 
Oct 31 06:53:15 server sshd\[30599\]: Failed password for invalid user sylee from 51.68.123.192 port 48546 ssh2
...
2019-10-31 14:35:30
151.80.4.248 attackbots
Oct 30 02:30:41 collab sshd[18672]: Did not receive identification string from 151.80.4.248
Oct 30 02:33:51 collab sshd[18789]: Invalid user a from 151.80.4.248
Oct 30 02:33:53 collab sshd[18789]: Failed password for invalid user a from 151.80.4.248 port 46072 ssh2
Oct 30 02:33:53 collab sshd[18789]: Received disconnect from 151.80.4.248: 11: Normal Shutdown, Thank you for playing [preauth]
Oct 30 02:34:34 collab sshd[18837]: Failed password for r.r from 151.80.4.248 port 46928 ssh2
Oct 30 02:34:34 collab sshd[18837]: Received disconnect from 151.80.4.248: 11: Normal Shutdown, Thank you for playing [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=151.80.4.248
2019-10-31 14:47:34
139.162.123.103 attackbots
34567/tcp 34567/tcp 34567/tcp...
[2019-08-31/10-31]77pkt,1pt.(tcp)
2019-10-31 15:17:14
103.203.132.167 attackspam
DATE:2019-10-31 04:52:10, IP:103.203.132.167, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-10-31 15:16:35
46.38.144.17 attack
Oct 31 07:49:12 vmanager6029 postfix/smtpd\[8206\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 31 07:50:22 vmanager6029 postfix/smtpd\[8206\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-31 14:53:05
197.188.166.38 attack
port scan and connect, tcp 23 (telnet)
2019-10-31 14:50:57
61.180.94.131 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/61.180.94.131/ 
 
 CN - 1H : (695)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 61.180.94.131 
 
 CIDR : 61.180.0.0/17 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 14 
  3H - 41 
  6H - 88 
 12H - 161 
 24H - 304 
 
 DateTime : 2019-10-31 04:52:56 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-31 14:47:10
159.203.201.29 attackbotsspam
3128/tcp 8081/tcp 8080/tcp...
[2019-09-12/10-31]48pkt,44pt.(tcp),1pt.(udp)
2019-10-31 15:11:36

Recently Reported IPs

104.18.6.99 104.18.64.184 104.18.64.52 142.158.123.201
104.18.64.57 104.18.64.62 104.18.65.11 104.18.65.184
104.18.65.52 104.18.65.98 104.18.66.100 160.4.245.190
104.18.66.184 104.18.66.52 185.58.129.142 104.18.67.184
104.18.7.103 104.18.7.105 104.18.7.108 85.67.254.120