Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.180.102.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.180.102.18.			IN	A

;; AUTHORITY SECTION:
.			131	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030801 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 09 05:49:47 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 18.102.180.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.102.180.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.233.213.87 attackspambots
May 12 06:03:54 meumeu sshd[23024]: Failed password for root from 49.233.213.87 port 43906 ssh2
May 12 06:09:55 meumeu sshd[23934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.213.87 
May 12 06:09:56 meumeu sshd[23934]: Failed password for invalid user developer from 49.233.213.87 port 42742 ssh2
...
2020-05-12 15:17:40
95.110.201.243 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-05-12 15:31:07
62.28.253.197 attackspam
May 12 10:46:08 pkdns2 sshd\[60260\]: Invalid user root2 from 62.28.253.197May 12 10:46:10 pkdns2 sshd\[60260\]: Failed password for invalid user root2 from 62.28.253.197 port 52807 ssh2May 12 10:50:12 pkdns2 sshd\[60521\]: Invalid user ubuntu from 62.28.253.197May 12 10:50:14 pkdns2 sshd\[60521\]: Failed password for invalid user ubuntu from 62.28.253.197 port 36382 ssh2May 12 10:54:14 pkdns2 sshd\[60721\]: Invalid user postgres from 62.28.253.197May 12 10:54:16 pkdns2 sshd\[60721\]: Failed password for invalid user postgres from 62.28.253.197 port 57307 ssh2
...
2020-05-12 15:56:30
200.209.145.251 attackspambots
<6 unauthorized SSH connections
2020-05-12 15:26:13
203.162.54.247 attack
2020-05-12T09:30:29.623557sd-86998 sshd[38480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.162.54.247  user=root
2020-05-12T09:30:31.951441sd-86998 sshd[38480]: Failed password for root from 203.162.54.247 port 58116 ssh2
2020-05-12T09:32:39.909845sd-86998 sshd[38785]: Invalid user viper from 203.162.54.247 port 33274
2020-05-12T09:32:39.912409sd-86998 sshd[38785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.162.54.247
2020-05-12T09:32:39.909845sd-86998 sshd[38785]: Invalid user viper from 203.162.54.247 port 33274
2020-05-12T09:32:41.753721sd-86998 sshd[38785]: Failed password for invalid user viper from 203.162.54.247 port 33274 ssh2
...
2020-05-12 15:53:19
192.169.190.108 attack
2020-05-12T09:32:39.270072  sshd[4764]: Invalid user test from 192.169.190.108 port 56644
2020-05-12T09:32:39.284729  sshd[4764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.169.190.108
2020-05-12T09:32:39.270072  sshd[4764]: Invalid user test from 192.169.190.108 port 56644
2020-05-12T09:32:41.126313  sshd[4764]: Failed password for invalid user test from 192.169.190.108 port 56644 ssh2
...
2020-05-12 15:48:01
61.151.130.20 attack
May 12 05:40:05 lock-38 sshd[2272658]: Invalid user ubuntu from 61.151.130.20 port 47227
May 12 05:40:05 lock-38 sshd[2272658]: Failed password for invalid user ubuntu from 61.151.130.20 port 47227 ssh2
May 12 05:40:05 lock-38 sshd[2272658]: Disconnected from invalid user ubuntu 61.151.130.20 port 47227 [preauth]
May 12 05:51:19 lock-38 sshd[2272913]: Failed password for root from 61.151.130.20 port 41438 ssh2
May 12 05:51:19 lock-38 sshd[2272913]: Disconnected from authenticating user root 61.151.130.20 port 41438 [preauth]
...
2020-05-12 15:37:16
78.182.39.101 attackbotsspam
Unauthorized connection attempt detected from IP address 78.182.39.101 to port 23
2020-05-12 15:36:03
49.232.14.216 attackspam
5x Failed Password
2020-05-12 15:47:35
49.235.90.120 attack
May 12 08:22:14 xeon sshd[63703]: Failed password for daemon from 49.235.90.120 port 55994 ssh2
2020-05-12 15:48:45
193.31.40.37 attack
389/tcp 389/udp 123/udp...
[2020-03-20/05-12]15pkt,2pt.(tcp),2pt.(udp)
2020-05-12 15:41:21
58.59.194.65 attack
port 23
2020-05-12 15:54:38
51.158.118.70 attackbots
Brute-force attempt banned
2020-05-12 15:30:36
177.17.0.225 attackbotsspam
Port probing on unauthorized port 23
2020-05-12 15:38:36
149.56.44.101 attackbotsspam
<6 unauthorized SSH connections
2020-05-12 15:15:54

Recently Reported IPs

173.233.29.62 110.248.174.2 221.148.6.255 62.173.138.82
163.182.180.240 75.144.219.48 27.6.189.88 80.83.163.232
3.89.171.13 157.14.204.32 196.80.237.220 67.58.73.219
46.34.210.135 120.204.234.148 78.194.22.82 187.147.138.18
49.83.226.99 221.51.131.93 82.22.9.40 89.217.179.199