Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.18.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.18.108.			IN	A

;; AUTHORITY SECTION:
.			261	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 18:47:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 108.18.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.18.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.233.151.183 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-09-11 20:57:35
185.108.106.251 attack
[2020-09-11 08:35:45] NOTICE[1239] chan_sip.c: Registration from '' failed for '185.108.106.251:56200' - Wrong password
[2020-09-11 08:35:45] SECURITY[1264] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-11T08:35:45.786-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4983",SessionID="0x7f4d480d6c18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.108.106.251/56200",Challenge="260fb45b",ReceivedChallenge="260fb45b",ReceivedHash="fa8e5b7fe8e9cfd643e394a80397eb81"
[2020-09-11 08:36:20] NOTICE[1239] chan_sip.c: Registration from '' failed for '185.108.106.251:56389' - Wrong password
[2020-09-11 08:36:20] SECURITY[1264] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-11T08:36:20.069-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="5531",SessionID="0x7f4d480d6c18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.108
...
2020-09-11 20:53:26
176.31.225.213 attack
*Port Scan* detected from 176.31.225.213 (FR/France/Hauts-de-France/Roubaix/ns3170223.ip-176-31-225.eu). 4 hits in the last 230 seconds
2020-09-11 20:33:19
222.186.42.137 attackspam
2020-09-11T15:45:30.704272lavrinenko.info sshd[25441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-09-11T15:45:32.396140lavrinenko.info sshd[25441]: Failed password for root from 222.186.42.137 port 31563 ssh2
2020-09-11T15:45:30.704272lavrinenko.info sshd[25441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-09-11T15:45:32.396140lavrinenko.info sshd[25441]: Failed password for root from 222.186.42.137 port 31563 ssh2
2020-09-11T15:45:35.063305lavrinenko.info sshd[25441]: Failed password for root from 222.186.42.137 port 31563 ssh2
...
2020-09-11 20:48:23
103.145.13.99 attack
 UDP 103.145.13.99:5140 -> port 5060, len 441
2020-09-11 20:26:48
95.135.127.157 attack
Invalid user admin from 95.135.127.157 port 51848
2020-09-11 20:50:51
1.165.160.162 attack
Unauthorized connection attempt from IP address 1.165.160.162 on Port 445(SMB)
2020-09-11 20:20:56
118.70.128.28 attack
Unauthorised access (Sep 11) SRC=118.70.128.28 LEN=52 TTL=115 ID=26053 TCP DPT=445 WINDOW=8192 SYN
2020-09-11 20:37:05
151.80.140.166 attackbots
Brute-force attempt banned
2020-09-11 20:24:00
181.214.99.156 attack
(From isbell.blondell@gmail.com) Hi,

We are one of the largest suppliers of social media marketing services for business.
Facebook, Twitter, Instagram and Youtube.

Give your social media a huge amount of followers,
likes, shares, subscribers and views fast.

Our Most Popular Package: 2,500 Instagram Likes for $49.00.

We look forward to skyrocketing your social media needs.

Kind Regards,
Kathy
https://social-media-blast.com
2020-09-11 20:42:37
139.99.133.125 attackbotsspam
E-Mail Spam (RBL) [REJECTED]
2020-09-11 20:30:26
193.239.147.192 attack
[Thu Sep 10 14:27:16 2020] Failed password for invalid user admin from 193.239.147.192 port 58804 ssh2
[Thu Sep 10 14:27:18 2020] Failed password for invalid user adsl from 193.239.147.192 port 58766 ssh2
[Thu Sep 10 14:27:18 2020] Failed password for invalid user telecomadmin from 193.239.147.192 port 58728 ssh2
[Thu Sep 10 14:27:18 2020] Failed password for invalid user admin from 193.239.147.192 port 58792 ssh2
[Thu Sep 10 14:27:18 2020] Failed password for invalid user mgts from 193.239.147.192 port 58770 ssh2
[Thu Sep 10 14:27:18 2020] Failed password for invalid user mgts from 193.239.147.192 port 58768 ssh2
[Thu Sep 10 14:27:18 2020] Failed password for invalid user superadmin from 193.239.147.192 port 58776 ssh2
[Thu Sep 10 14:27:18 2020] Failed password for r.r from 193.239.147.192 port 58742 ssh2
[Thu Sep 10 14:27:18 2020] Failed password for invalid user spectrum from 193.239.147.192 port 58606 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=
2020-09-11 20:25:31
111.229.139.95 attackbots
SSH Brute Force
2020-09-11 20:57:17
112.85.42.172 attackbots
Sep 11 12:11:16 instance-2 sshd[11082]: Failed password for root from 112.85.42.172 port 60463 ssh2
Sep 11 12:11:21 instance-2 sshd[11082]: Failed password for root from 112.85.42.172 port 60463 ssh2
Sep 11 12:11:25 instance-2 sshd[11082]: Failed password for root from 112.85.42.172 port 60463 ssh2
Sep 11 12:11:29 instance-2 sshd[11082]: Failed password for root from 112.85.42.172 port 60463 ssh2
2020-09-11 20:19:51
51.79.84.101 attackspam
Sep 11 12:35:44 ajax sshd[17390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.84.101 
Sep 11 12:35:46 ajax sshd[17390]: Failed password for invalid user ssh from 51.79.84.101 port 34424 ssh2
2020-09-11 20:52:34

Recently Reported IPs

104.22.17.220 104.22.18.147 104.22.18.152 104.22.18.198
104.22.18.216 104.22.19.108 104.22.19.152 104.22.19.198
104.22.19.216 152.200.141.46 104.22.2.125 104.22.2.193
104.22.2.240 104.22.2.241 104.22.2.41 104.22.20.118
104.22.20.224 104.22.20.243 104.22.20.87 104.22.21.118