Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.74.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.74.53.			IN	A

;; AUTHORITY SECTION:
.			120	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 420 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 02:51:30 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 53.74.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.74.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.4.239.146 attackspam
Too many connections or unauthorized access detected from Oscar banned ip
2019-09-07 23:31:09
83.15.183.138 attackspam
Sep  7 12:47:47 ns37 sshd[15580]: Failed password for root from 83.15.183.138 port 15215 ssh2
Sep  7 12:47:47 ns37 sshd[15580]: Failed password for root from 83.15.183.138 port 15215 ssh2
2019-09-07 23:14:27
90.148.170.179 attackbotsspam
Sep  7 11:39:12 h2421860 postfix/postscreen[10871]: CONNECT from [90.148.170.179]:59029 to [85.214.119.52]:25
Sep  7 11:39:12 h2421860 postfix/dnsblog[10874]: addr 90.148.170.179 listed by domain zen.spamhaus.org as 127.0.0.4
Sep  7 11:39:12 h2421860 postfix/dnsblog[10874]: addr 90.148.170.179 listed by domain zen.spamhaus.org as 127.0.0.11
Sep  7 11:39:12 h2421860 postfix/dnsblog[10874]: addr 90.148.170.179 listed by domain Unknown.trblspam.com as 185.53.179.7
Sep  7 11:39:12 h2421860 postfix/dnsblog[10880]: addr 90.148.170.179 listed by domain dnsbl.sorbs.net as 127.0.0.10
Sep  7 11:39:12 h2421860 postfix/dnsblog[10880]: addr 90.148.170.179 listed by domain dnsbl.sorbs.net as 127.0.0.6
Sep  7 11:39:12 h2421860 postfix/dnsblog[10876]: addr 90.148.170.179 listed by domain b.barracudacentral.org as 127.0.0.2
Sep  7 11:39:14 h2421860 postfix/dnsblog[10875]: addr 90.148.170.179 listed by domain bl.spamcop.net as 127.0.0.2
Sep  7 11:39:18 h2421860 postfix/postscreen[10871]:........
-------------------------------
2019-09-08 00:17:37
122.114.78.114 attack
Sep  7 14:27:48 www4 sshd\[5616\]: Invalid user pass from 122.114.78.114
Sep  7 14:27:48 www4 sshd\[5616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.78.114
Sep  7 14:27:50 www4 sshd\[5616\]: Failed password for invalid user pass from 122.114.78.114 port 54148 ssh2
...
2019-09-07 23:38:01
46.229.168.147 attackspam
Automatic report - Banned IP Access
2019-09-07 23:58:33
218.98.40.147 attackbots
Sep  7 16:21:33 cvbmail sshd\[7238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.147  user=root
Sep  7 16:21:35 cvbmail sshd\[7238\]: Failed password for root from 218.98.40.147 port 64476 ssh2
Sep  7 16:21:46 cvbmail sshd\[7240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.147  user=root
2019-09-07 23:23:05
95.10.224.109 attackbotsspam
Automatic report - Port Scan Attack
2019-09-07 23:41:30
111.231.113.236 attackbotsspam
Automatic report - Banned IP Access
2019-09-07 23:55:38
165.22.168.131 attackbots
WP_xmlrpc_attack
2019-09-08 00:07:05
134.255.234.104 attack
Sep  7 14:32:31 s64-1 sshd[23637]: Failed password for mysql from 134.255.234.104 port 48712 ssh2
Sep  7 14:33:00 s64-1 sshd[23640]: Failed password for mysql from 134.255.234.104 port 40298 ssh2
...
2019-09-07 23:54:24
218.98.40.153 attack
Sep  7 17:13:43 amit sshd\[15972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.153  user=root
Sep  7 17:13:45 amit sshd\[15972\]: Failed password for root from 218.98.40.153 port 54478 ssh2
Sep  7 17:14:09 amit sshd\[15975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.153  user=root
...
2019-09-07 23:30:19
13.233.32.46 attackbotsspam
2019-09-07 21:48:10,087 fail2ban.actions        [636]: NOTICE  [sshd] Ban 13.233.32.46
2019-09-07 22:04:52,865 fail2ban.actions        [636]: NOTICE  [sshd] Ban 13.233.32.46
2019-09-07 22:14:59,059 fail2ban.actions        [636]: NOTICE  [sshd] Ban 13.233.32.46


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=13.233.32.46
2019-09-07 23:21:02
45.131.2.32 attack
Received: from shaxiachapter.top (45.131.2.32)
Domain Service
2019-09-07 23:50:33
159.65.219.48 attack
Sep  7 01:45:47 lcprod sshd\[18760\]: Invalid user daniel from 159.65.219.48
Sep  7 01:45:47 lcprod sshd\[18760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.48
Sep  7 01:45:49 lcprod sshd\[18760\]: Failed password for invalid user daniel from 159.65.219.48 port 57058 ssh2
Sep  7 01:51:21 lcprod sshd\[19265\]: Invalid user teamspeak3 from 159.65.219.48
Sep  7 01:51:21 lcprod sshd\[19265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.48
2019-09-08 00:27:59
114.67.93.39 attackbots
Sep  7 02:09:02 lcdev sshd\[13657\]: Invalid user sinusbot from 114.67.93.39
Sep  7 02:09:02 lcdev sshd\[13657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.93.39
Sep  7 02:09:04 lcdev sshd\[13657\]: Failed password for invalid user sinusbot from 114.67.93.39 port 60212 ssh2
Sep  7 02:14:49 lcdev sshd\[14221\]: Invalid user minecraft from 114.67.93.39
Sep  7 02:14:49 lcdev sshd\[14221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.93.39
2019-09-07 23:25:33

Recently Reported IPs

104.18.73.6 104.18.76.54 104.18.74.54 104.18.75.54
104.18.77.54 104.18.8.208 104.18.8.172 104.18.8.245
104.19.142.104 104.19.151.122 104.19.150.122 104.19.143.104
104.19.149.52 104.19.152.31 104.19.155.131 104.19.150.52
104.19.152.19 104.19.153.31 104.19.156.131 104.19.153.19