Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.104.128.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.104.128.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 04:22:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 18.128.104.207.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.128.104.207.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.78.12.22 attack
port
2020-01-22 00:04:22
171.244.43.52 attackspambots
Jan 21 17:51:56 hosting sshd[5349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.52  user=root
Jan 21 17:51:58 hosting sshd[5349]: Failed password for root from 171.244.43.52 port 43802 ssh2
...
2020-01-22 00:26:08
134.209.81.60 attackspam
Unauthorized connection attempt detected from IP address 134.209.81.60 to port 2220 [J]
2020-01-22 00:35:36
187.45.105.147 attack
Unauthorized connection attempt detected from IP address 187.45.105.147 to port 2220 [J]
2020-01-22 00:20:59
164.132.54.215 attack
Jan 21 06:07:42 eddieflores sshd\[7498\]: Invalid user angelica from 164.132.54.215
Jan 21 06:07:42 eddieflores sshd\[7498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=215.ip-164-132-54.eu
Jan 21 06:07:44 eddieflores sshd\[7498\]: Failed password for invalid user angelica from 164.132.54.215 port 42458 ssh2
Jan 21 06:11:04 eddieflores sshd\[7962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=215.ip-164-132-54.eu  user=root
Jan 21 06:11:06 eddieflores sshd\[7962\]: Failed password for root from 164.132.54.215 port 45052 ssh2
2020-01-22 00:27:12
40.114.226.249 attackbots
Unauthorized connection attempt detected from IP address 40.114.226.249 to port 2220 [J]
2020-01-22 00:01:09
41.42.178.247 attackspam
Invalid user admin from 41.42.178.247 port 48331
2020-01-22 00:00:47
27.44.13.104 attackspambots
Invalid user keith from 27.44.13.104 port 54330
2020-01-22 00:04:45
197.232.47.210 attackspam
Jan 21 16:05:22 MainVPS sshd[20779]: Invalid user ab from 197.232.47.210 port 30861
Jan 21 16:05:22 MainVPS sshd[20779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.232.47.210
Jan 21 16:05:22 MainVPS sshd[20779]: Invalid user ab from 197.232.47.210 port 30861
Jan 21 16:05:23 MainVPS sshd[20779]: Failed password for invalid user ab from 197.232.47.210 port 30861 ssh2
Jan 21 16:09:38 MainVPS sshd[29164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.232.47.210  user=root
Jan 21 16:09:40 MainVPS sshd[29164]: Failed password for root from 197.232.47.210 port 21671 ssh2
...
2020-01-22 00:15:10
191.55.166.69 attackspambots
Invalid user admin from 191.55.166.69 port 57151
2020-01-22 00:19:44
192.163.224.116 attackbotsspam
Invalid user daniela from 192.163.224.116 port 41018
2020-01-22 00:19:11
45.236.129.149 attackspam
Jan 21 12:25:21 firewall sshd[24344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.236.129.149
Jan 21 12:25:21 firewall sshd[24344]: Invalid user ubuntu from 45.236.129.149
Jan 21 12:25:23 firewall sshd[24344]: Failed password for invalid user ubuntu from 45.236.129.149 port 44414 ssh2
...
2020-01-21 23:58:32
138.197.113.240 attackbotsspam
Invalid user cip from 138.197.113.240 port 56122
2020-01-22 00:34:04
138.68.72.7 attackbotsspam
Invalid user icaro from 138.68.72.7 port 53500
2020-01-22 00:34:58
46.105.124.52 attackspambots
SSH bruteforce (Triggered fail2ban)
2020-01-21 23:58:02

Recently Reported IPs

62.111.123.222 172.235.135.221 192.100.127.220 140.119.58.154
129.199.195.254 228.181.91.201 205.119.10.204 49.3.144.119
62.89.216.108 180.203.31.138 56.231.173.145 84.201.51.194
226.132.157.113 95.72.141.158 35.219.106.38 91.163.3.26
209.155.233.167 189.244.209.127 39.196.201.75 47.218.54.184