Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.18.7.4 attackspam
[DoS Attack: SYN/ACK Scan] from source: 104.18.7.4, port 443, Friday, July 31, 2020 22:27:58
2020-08-01 06:05:57
104.18.70.149 attack
"MarketingPromoSystems, 8 The Green Suite #5828 Dover DE" 185.230.46.95 - phishing redirect www1.innovationaltech.xyz
2020-05-24 22:42:26
104.18.71.149 attack
"MarketingPromoSystems, 8 The Green Suite #5828 Dover DE" 185.230.46.95 - phishing redirect www1.innovationaltech.xyz
2020-05-24 22:11:41
104.18.72.149 attackspam
"MarketingPromoSystems, 8 The Green Suite #5828 Dover DE" 185.230.46.95 - phishing redirect www1.innovationaltech.xyz
2020-05-24 21:44:55
104.18.70.28 spam
AGAIN and AGAIN and ALWAYS the same REGISTRAR as 1api.net TO STOP IMMEDIATELY for keeping SPAMMERS, LIERS, ROBERS and else since too many years ! The cheapest service, as usual...
Dossier transmis aux autorités Européennes et Françaises pour CONDAMNATION à 750 € par POURRIEL émis les SOUS MERDES, OK ?

From: Joka 
Date: Wed, 18 Mar 2020 16:46:18 +0000
Subject: LE CASINO JOKA. =?utf-8?b?T8OZ?= LES FORTUNES SE PROFILENT
Message-Id: <4WMA.BA1D.F33KVOH670.20200318164618859@bestoffer-today.com>

live@bestoffer-today.com which send to « https://bestoffer-today.com/4WMA-BA1D-F33KVOH670/uauto.aspx » to BURN / CLOSE / DELETTE / STOP IMMEDIATELY for SPAM, PHISHING and SCAM on STOLLEN List ! ! !

bestoffer-today.com => 1api.net

bestoffer-today.com => 104.16.209.86

104.16.209.86 => cloudflare.com AS USUAL...

1api.net => 84.200.110.124

84.200.110.124 => accelerated.de

live@bestoffer-today.com => 94.143.106.199

94.143.106.199 => dotmailer.com

dotmailer.com => 104.18.70.28

104.18.70.28 => cloudflare.com AS USUAL...

dotmailer.com send to dotdigital.com

dotdigital.com => 104.19.144.113

104.19.144.113 => cloudflare.com

https://www.mywot.com/scorecard/dotmailer.com

https://www.mywot.com/scorecard/dotdigital.com

https://www.mywot.com/scorecard/bestoffer-today.com

https://www.mywot.com/scorecard/1api.net AS USUAL...

https://en.asytech.cn/check-ip/104.16.209.86

https://en.asytech.cn/check-ip/84.200.110.124

https://en.asytech.cn/check-ip/94.143.106.199

https://en.asytech.cn/check-ip/104.18.70.28

https://en.asytech.cn/check-ip/104.19.144.113
2020-03-19 05:04:23
104.18.70.106 attack
siteaudit.crawler.semrush.com - - \[27/Oct/2019:04:48:48 +0100\] "GET /robots.txt HTTP/1.1" 200 4578 "-" "Mozilla/5.0 \(compatible\; Googlebot/2.1\; +http://www.google.com/bot.html\)"
siteaudit.crawler.semrush.com - - \[27/Oct/2019:04:48:49 +0100\] "GET /galerie/villa-bunterkund.html HTTP/1.1" 200 10713 "-" "Mozilla/5.0 \(compatible\; Googlebot/2.1\; +http://www.google.com/bot.html\)"
siteaudit.crawler.semrush.com - - \[27/Oct/2019:04:48:55 +0100\] "GET / HTTP/1.1" 200 9534 "-" "Mozilla/5.0 \(compatible\; Googlebot/2.1\; +http://www.google.com/bot.html\)"
...
2019-10-27 17:27:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.7.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52894
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.7.145.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 15:43:07 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 145.7.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.7.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
102.186.225.240 attack
20/3/23@11:41:48: FAIL: Alarm-Network address from=102.186.225.240
20/3/23@11:41:48: FAIL: Alarm-Network address from=102.186.225.240
...
2020-03-24 06:21:37
47.113.197.149 attackspambots
/admin/login.php
2020-03-24 06:34:49
68.65.123.228 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-03-24 06:03:54
45.65.196.14 attackspambots
2020-03-23 20:30:08,162 fail2ban.actions: WARNING [ssh] Ban 45.65.196.14
2020-03-24 06:45:06
205.185.124.100 attack
xmlrpc attack
2020-03-24 06:34:00
103.121.74.133 attackbots
" "
2020-03-24 06:22:45
49.231.176.19 attackspambots
20/3/23@11:41:45: FAIL: Alarm-Network address from=49.231.176.19
...
2020-03-24 06:22:57
210.211.116.204 attack
Mar 23 23:26:51 raspberrypi sshd[9649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.211.116.204
2020-03-24 06:28:48
5.249.131.161 attackspambots
Mar 23 20:48:43 ns392434 sshd[1158]: Invalid user np from 5.249.131.161 port 53187
Mar 23 20:48:43 ns392434 sshd[1158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.131.161
Mar 23 20:48:43 ns392434 sshd[1158]: Invalid user np from 5.249.131.161 port 53187
Mar 23 20:48:45 ns392434 sshd[1158]: Failed password for invalid user np from 5.249.131.161 port 53187 ssh2
Mar 23 20:59:24 ns392434 sshd[1656]: Invalid user ivo from 5.249.131.161 port 2172
Mar 23 20:59:24 ns392434 sshd[1656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.131.161
Mar 23 20:59:24 ns392434 sshd[1656]: Invalid user ivo from 5.249.131.161 port 2172
Mar 23 20:59:26 ns392434 sshd[1656]: Failed password for invalid user ivo from 5.249.131.161 port 2172 ssh2
Mar 23 21:03:21 ns392434 sshd[1762]: Invalid user purse from 5.249.131.161 port 7047
2020-03-24 06:27:50
197.35.221.201 attackspambots
Mar 23 11:32:49 cumulus sshd[20583]: Invalid user admin from 197.35.221.201 port 55266
Mar 23 11:32:49 cumulus sshd[20583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.35.221.201
Mar 23 11:32:51 cumulus sshd[20583]: Failed password for invalid user admin from 197.35.221.201 port 55266 ssh2
Mar 23 11:32:52 cumulus sshd[20583]: Connection closed by 197.35.221.201 port 55266 [preauth]
Mar 23 11:32:57 cumulus sshd[20587]: Invalid user admin from 197.35.221.201 port 55289
Mar 23 11:32:57 cumulus sshd[20587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.35.221.201
Mar 23 11:32:59 cumulus sshd[20587]: Failed password for invalid user admin from 197.35.221.201 port 55289 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.35.221.201
2020-03-24 06:19:59
46.167.76.208 attackbots
Mar 23 21:55:07 v22019058497090703 sshd[1255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.167.76.208
Mar 23 21:55:08 v22019058497090703 sshd[1255]: Failed password for invalid user hacking from 46.167.76.208 port 46030 ssh2
...
2020-03-24 06:06:46
61.161.250.202 attackbotsspam
Mar 23 22:20:46 cloud sshd[13582]: Failed password for mysql from 61.161.250.202 port 32800 ssh2
Mar 23 22:36:59 cloud sshd[13796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.161.250.202
2020-03-24 06:09:49
198.71.234.41 attack
Mar 23 15:41:18 mercury wordpress(lukegirvin.com)[21471]: XML-RPC authentication failure for luke from 198.71.234.41
...
2020-03-24 06:41:14
51.254.39.183 attack
Mar 23 15:05:31 firewall sshd[11205]: Invalid user owen from 51.254.39.183
Mar 23 15:05:33 firewall sshd[11205]: Failed password for invalid user owen from 51.254.39.183 port 46572 ssh2
Mar 23 15:13:09 firewall sshd[11499]: Invalid user ll from 51.254.39.183
...
2020-03-24 06:42:47
122.51.105.141 attack
2020-03-23T21:28:10.677670abusebot.cloudsearch.cf sshd[26974]: Invalid user mysql1 from 122.51.105.141 port 36544
2020-03-23T21:28:10.684384abusebot.cloudsearch.cf sshd[26974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.105.141
2020-03-23T21:28:10.677670abusebot.cloudsearch.cf sshd[26974]: Invalid user mysql1 from 122.51.105.141 port 36544
2020-03-23T21:28:12.211215abusebot.cloudsearch.cf sshd[26974]: Failed password for invalid user mysql1 from 122.51.105.141 port 36544 ssh2
2020-03-23T21:33:23.730720abusebot.cloudsearch.cf sshd[27403]: Invalid user ann from 122.51.105.141 port 43122
2020-03-23T21:33:23.737335abusebot.cloudsearch.cf sshd[27403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.105.141
2020-03-23T21:33:23.730720abusebot.cloudsearch.cf sshd[27403]: Invalid user ann from 122.51.105.141 port 43122
2020-03-23T21:33:25.565486abusebot.cloudsearch.cf sshd[27403]: Failed password 
...
2020-03-24 06:39:40

Recently Reported IPs

251.246.173.248 104.18.74.77 104.18.6.145 104.18.76.14
104.18.75.14 104.18.73.77 104.19.133.72 104.19.135.72
104.19.137.73 104.19.136.72 104.19.134.72 104.19.13.199
104.19.139.73 104.19.13.191 104.19.140.73 104.19.138.73
104.19.137.72 104.19.11.106 104.19.142.101 104.19.141.73