Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.18.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.18.100.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:26:32 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 100.18.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.18.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
147.135.158.99 attackspambots
Aug 23 06:36:41 sachi sshd\[29698\]: Invalid user test from 147.135.158.99
Aug 23 06:36:41 sachi sshd\[29698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip99.ip-147-135-158.eu
Aug 23 06:36:43 sachi sshd\[29698\]: Failed password for invalid user test from 147.135.158.99 port 47072 ssh2
Aug 23 06:40:54 sachi sshd\[30134\]: Invalid user marko from 147.135.158.99
Aug 23 06:40:54 sachi sshd\[30134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip99.ip-147-135-158.eu
2019-08-24 00:46:33
139.155.149.142 attackspambots
Aug 23 13:06:45 TORMINT sshd\[30974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.149.142  user=root
Aug 23 13:06:47 TORMINT sshd\[30974\]: Failed password for root from 139.155.149.142 port 50270 ssh2
Aug 23 13:10:24 TORMINT sshd\[31115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.149.142  user=root
...
2019-08-24 01:15:53
180.178.106.124 attackbots
Aug 23 19:21:47 dedicated sshd[19328]: Invalid user lis from 180.178.106.124 port 33502
2019-08-24 01:22:21
123.207.245.120 attack
Aug 23 06:36:12 hcbb sshd\[4862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.245.120  user=root
Aug 23 06:36:13 hcbb sshd\[4862\]: Failed password for root from 123.207.245.120 port 35336 ssh2
Aug 23 06:40:51 hcbb sshd\[5308\]: Invalid user brian from 123.207.245.120
Aug 23 06:40:51 hcbb sshd\[5308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.245.120
Aug 23 06:40:52 hcbb sshd\[5308\]: Failed password for invalid user brian from 123.207.245.120 port 41948 ssh2
2019-08-24 01:14:17
5.39.82.197 attackbotsspam
Aug 23 12:45:43 plusreed sshd[18906]: Invalid user staette from 5.39.82.197
...
2019-08-24 00:58:15
196.52.43.129 attackbots
8531/tcp 44818/udp 9443/tcp...
[2019-06-24/08-23]33pkt,26pt.(tcp),3pt.(udp)
2019-08-24 01:09:50
185.175.93.105 attack
08/23/2019-13:30:57.704675 185.175.93.105 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-24 01:34:52
181.49.164.253 attackspam
Aug 23 18:18:07 dev0-dcfr-rnet sshd[6726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.164.253
Aug 23 18:18:09 dev0-dcfr-rnet sshd[6726]: Failed password for invalid user rick from 181.49.164.253 port 34206 ssh2
Aug 23 18:22:50 dev0-dcfr-rnet sshd[6750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.164.253
2019-08-24 00:55:14
103.53.172.106 attack
2019-08-23T19:27:32.455186  sshd[17035]: Invalid user smtp from 103.53.172.106 port 57039
2019-08-23T19:27:32.468996  sshd[17035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.53.172.106
2019-08-23T19:27:32.455186  sshd[17035]: Invalid user smtp from 103.53.172.106 port 57039
2019-08-23T19:27:34.406554  sshd[17035]: Failed password for invalid user smtp from 103.53.172.106 port 57039 ssh2
2019-08-23T19:32:28.495757  sshd[17133]: Invalid user nadege from 103.53.172.106 port 51435
...
2019-08-24 01:35:45
1.171.40.130 attackspambots
[portscan] Port scan
2019-08-24 01:11:52
93.40.4.54 attackbots
Automatic report - Port Scan Attack
2019-08-24 01:04:45
176.31.253.204 attack
Aug 23 12:18:25 plusreed sshd[9739]: Invalid user filter from 176.31.253.204
Aug 23 12:18:25 plusreed sshd[9739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.253.204
Aug 23 12:18:25 plusreed sshd[9739]: Invalid user filter from 176.31.253.204
Aug 23 12:18:27 plusreed sshd[9739]: Failed password for invalid user filter from 176.31.253.204 port 39235 ssh2
Aug 23 12:23:06 plusreed sshd[11311]: Invalid user jazmin from 176.31.253.204
...
2019-08-24 00:41:23
52.231.31.11 attackbots
Aug 23 06:48:33 sachi sshd\[30781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.31.11  user=root
Aug 23 06:48:35 sachi sshd\[30781\]: Failed password for root from 52.231.31.11 port 52678 ssh2
Aug 23 06:53:36 sachi sshd\[31232\]: Invalid user rod from 52.231.31.11
Aug 23 06:53:36 sachi sshd\[31232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.31.11
Aug 23 06:53:38 sachi sshd\[31232\]: Failed password for invalid user rod from 52.231.31.11 port 43798 ssh2
2019-08-24 00:57:09
159.65.63.39 attackbots
Aug 23 12:35:27 ny01 sshd[30336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.63.39
Aug 23 12:35:29 ny01 sshd[30336]: Failed password for invalid user ward from 159.65.63.39 port 32920 ssh2
Aug 23 12:39:46 ny01 sshd[30749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.63.39
2019-08-24 00:56:47
191.249.71.23 attack
Automatic report - Port Scan Attack
2019-08-24 00:49:20

Recently Reported IPs

104.22.17.79 104.22.17.95 104.22.17.81 104.22.17.90
104.22.18.104 104.22.17.87 104.22.18.115 104.22.18.124
104.22.18.106 104.22.18.123 104.22.18.128 104.22.18.131
104.22.18.126 104.22.18.144 104.22.18.139 104.22.18.130
104.22.18.140 104.22.18.136 104.22.18.146 104.22.18.150