Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.94.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5464
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.94.69.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 15:40:13 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 69.94.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.94.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
156.222.56.3 attackbots
Honeypot attack, port: 23, PTR: host-156.222.3.56-static.tedata.net.
2019-09-29 17:43:10
128.199.95.60 attackspambots
2019-09-29T04:49:34.8855721495-001 sshd\[54763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60
2019-09-29T04:49:37.3174441495-001 sshd\[54763\]: Failed password for invalid user thomas from 128.199.95.60 port 58888 ssh2
2019-09-29T05:01:04.8688961495-001 sshd\[55508\]: Invalid user wk from 128.199.95.60 port 53838
2019-09-29T05:01:04.8758571495-001 sshd\[55508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60
2019-09-29T05:01:06.6968721495-001 sshd\[55508\]: Failed password for invalid user wk from 128.199.95.60 port 53838 ssh2
2019-09-29T05:07:02.6185361495-001 sshd\[56087\]: Invalid user cd from 128.199.95.60 port 37198
...
2019-09-29 17:29:12
122.110.243.67 attack
port scan and connect, tcp 23 (telnet)
2019-09-29 17:39:43
111.231.239.143 attackspambots
Sep 29 04:33:28 ny01 sshd[5665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.239.143
Sep 29 04:33:30 ny01 sshd[5665]: Failed password for invalid user edbserv from 111.231.239.143 port 43364 ssh2
Sep 29 04:38:38 ny01 sshd[6642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.239.143
2019-09-29 17:51:41
182.61.46.191 attack
Sep 29 09:58:14 mail sshd[23704]: Invalid user anwendersoftware from 182.61.46.191
Sep 29 09:58:14 mail sshd[23704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.191
Sep 29 09:58:14 mail sshd[23704]: Invalid user anwendersoftware from 182.61.46.191
Sep 29 09:58:15 mail sshd[23704]: Failed password for invalid user anwendersoftware from 182.61.46.191 port 42370 ssh2
Sep 29 10:06:26 mail sshd[4469]: Invalid user beavis from 182.61.46.191
...
2019-09-29 17:53:23
130.61.88.225 attackbotsspam
Invalid user debian from 130.61.88.225 port 65380
2019-09-29 17:54:15
54.38.92.142 attack
Sep 29 08:14:57 localhost sshd\[10657\]: Invalid user atlas from 54.38.92.142 port 32910
Sep 29 08:14:57 localhost sshd\[10657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.92.142
Sep 29 08:14:59 localhost sshd\[10657\]: Failed password for invalid user atlas from 54.38.92.142 port 32910 ssh2
...
2019-09-29 17:30:12
183.6.43.105 attackbots
Sep 29 12:16:17 server sshd\[2956\]: Invalid user ivory from 183.6.43.105 port 55954
Sep 29 12:16:17 server sshd\[2956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.6.43.105
Sep 29 12:16:19 server sshd\[2956\]: Failed password for invalid user ivory from 183.6.43.105 port 55954 ssh2
Sep 29 12:21:46 server sshd\[25401\]: Invalid user dorjan from 183.6.43.105 port 39790
Sep 29 12:21:46 server sshd\[25401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.6.43.105
2019-09-29 17:27:37
139.206.155.150 attackspambots
[portscan] Port scan
2019-09-29 17:47:42
14.111.93.2 attackspam
Sep 29 05:43:00 ns4 sshd[12847]: Invalid user mv from 14.111.93.2
Sep 29 05:43:00 ns4 sshd[12847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.2 
Sep 29 05:43:02 ns4 sshd[12847]: Failed password for invalid user mv from 14.111.93.2 port 51152 ssh2
Sep 29 05:47:44 ns4 sshd[13375]: Invalid user hz from 14.111.93.2
Sep 29 05:47:44 ns4 sshd[13375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.2 
Sep 29 05:47:46 ns4 sshd[13375]: Failed password for invalid user hz from 14.111.93.2 port 34866 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.111.93.2
2019-09-29 17:34:04
167.179.76.246 attackbotsspam
29.09.2019 09:27:14 Recursive DNS scan
2019-09-29 17:45:04
110.78.208.12 attackbots
Sep 29 07:07:49 taivassalofi sshd[12678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.208.12
Sep 29 07:07:51 taivassalofi sshd[12678]: Failed password for invalid user giovanni from 110.78.208.12 port 57460 ssh2
...
2019-09-29 17:49:29
129.213.122.26 attackspam
Automatic report - Banned IP Access
2019-09-29 18:07:47
199.76.38.81 attackbots
Sep 28 23:40:47 php1 sshd\[11749\]: Invalid user test3 from 199.76.38.81
Sep 28 23:40:47 php1 sshd\[11749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.76.38.81
Sep 28 23:40:49 php1 sshd\[11749\]: Failed password for invalid user test3 from 199.76.38.81 port 57223 ssh2
Sep 28 23:48:03 php1 sshd\[12951\]: Invalid user alister from 199.76.38.81
Sep 28 23:48:03 php1 sshd\[12951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.76.38.81
2019-09-29 18:00:15
188.40.105.6 attackspam
Sep 29 01:34:24 www sshd[27032]: Invalid user debian from 188.40.105.6
Sep 29 01:34:26 www sshd[27032]: Failed password for invalid user debian from 188.40.105.6 port 42902 ssh2
Sep 29 01:34:26 www sshd[27032]: Received disconnect from 188.40.105.6: 11: Bye Bye [preauth]
Sep 29 01:54:02 www sshd[27203]: Invalid user amin from 188.40.105.6
Sep 29 01:54:04 www sshd[27203]: Failed password for invalid user amin from 188.40.105.6 port 58994 ssh2
Sep 29 01:54:04 www sshd[27203]: Received disconnect from 188.40.105.6: 11: Bye Bye [preauth]
Sep 29 01:57:46 www sshd[27248]: Invalid user mcftp from 188.40.105.6
Sep 29 01:57:49 www sshd[27248]: Failed password for invalid user mcftp from 188.40.105.6 port 44780 ssh2
Sep 29 01:57:49 www sshd[27248]: Received disconnect from 188.40.105.6: 11: Bye Bye [preauth]
Sep 29 02:01:23 www sshd[27297]: Invalid user admin from 188.40.105.6
Sep 29 02:01:25 www sshd[27297]: Failed password for invalid user admin from 188.40.105.6 port 58800 ssh........
-------------------------------
2019-09-29 17:55:40

Recently Reported IPs

104.18.94.59 104.18.95.20 104.18.95.59 104.18.97.89
188.204.254.241 111.89.97.0 104.18.98.234 104.18.98.75
104.18.99.234 104.18.99.75 104.182.112.123 104.19.132.105
104.19.133.105 197.255.243.186 104.19.135.80 104.19.136.80
104.19.137.80 104.19.138.72 5.118.217.174 104.19.138.80