Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.200.61.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.200.61.18.			IN	A

;; AUTHORITY SECTION:
.			330	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051902 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 20 12:14:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
18.61.200.104.in-addr.arpa domain name pointer 18-61-200-104.reverse-dns.chicago.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.61.200.104.in-addr.arpa	name = 18-61-200-104.reverse-dns.chicago.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.49.226.140 attackbots
Unauthorized connection attempt detected from IP address 37.49.226.140 to port 8088
2020-04-03 05:38:24
125.227.79.91 attackspambots
trying to access non-authorized port
2020-04-03 05:40:46
180.76.171.53 attackspam
Invalid user stazo from 180.76.171.53 port 46220
2020-04-03 05:31:22
222.186.42.75 attack
Apr  2 23:15:38 [HOSTNAME] sshd[27234]: User **removed** from 222.186.42.75 not allowed because not listed in AllowUsers
Apr  2 23:15:38 [HOSTNAME] sshd[27234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.75  user=**removed**
Apr  2 23:15:40 [HOSTNAME] sshd[27234]: Failed password for invalid user **removed** from 222.186.42.75 port 28789 ssh2
...
2020-04-03 05:19:20
80.211.7.53 attack
Brute force attempt
2020-04-03 05:22:58
45.160.63.112 attackspam
Automatic report - Port Scan Attack
2020-04-03 05:05:20
195.54.167.12 attack
[portscan] Port scan
2020-04-03 05:13:48
37.49.230.131 attack
(smtpauth) Failed SMTP AUTH login from 37.49.230.131 (NL/Netherlands/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-02 17:09:04 login authenticator failed for (User) [37.49.230.131]: 535 Incorrect authentication data (set_id=test@farasunict.com)
2020-04-03 05:18:54
88.88.25.14 attack
fail2ban
2020-04-03 05:14:39
132.232.248.82 attackbotsspam
Invalid user keila from 132.232.248.82 port 56858
2020-04-03 05:23:41
58.67.159.122 attackspambots
Apr  2 16:39:34 mail postfix/smtpd\[3457\]: warning: unknown\[58.67.159.122\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  2 16:41:45 mail postfix/smtpd\[3457\]: warning: unknown\[58.67.159.122\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  2 16:43:57 mail postfix/smtpd\[3763\]: warning: unknown\[58.67.159.122\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-03 05:32:35
188.166.175.35 attackbots
Brute force attempt
2020-04-03 05:04:06
80.151.130.207 attackspambots
fail2ban
2020-04-03 05:11:36
106.12.208.31 attack
Invalid user ug from 106.12.208.31 port 60172
2020-04-03 05:36:07
151.253.165.70 attack
Automatic report - XMLRPC Attack
2020-04-03 05:12:02

Recently Reported IPs

250.79.21.140 199.28.212.69 104.200.61.180 104.200.61.182
104.200.61.184 32.183.214.105 115.34.107.157 104.200.61.185
104.200.61.188 104.200.61.19 104.200.61.190 104.200.61.194
104.200.61.195 104.200.61.196 104.200.61.197 104.200.61.198
104.200.61.203 104.200.61.208 104.200.61.214 206.67.198.253