Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Portland

Region: Maine

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.63.104.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.63.104.18.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022901 1800 900 604800 86400

;; Query time: 138 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 11:40:38 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 18.104.63.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.104.63.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.32.250.141 attackbotsspam
firewall-block, port(s): 445/tcp
2019-09-06 04:45:37
104.248.185.73 attackbots
Sep  5 22:40:05 mail sshd\[28873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.185.73
Sep  5 22:40:08 mail sshd\[28873\]: Failed password for invalid user test from 104.248.185.73 port 57474 ssh2
Sep  5 22:44:14 mail sshd\[29307\]: Invalid user sammy from 104.248.185.73 port 44386
Sep  5 22:44:14 mail sshd\[29307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.185.73
Sep  5 22:44:15 mail sshd\[29307\]: Failed password for invalid user sammy from 104.248.185.73 port 44386 ssh2
2019-09-06 04:51:44
196.52.43.56 attackbotsspam
firewall-block, port(s): 5984/tcp
2019-09-06 04:33:44
197.155.115.60 attackspam
Sep  5 21:10:07 bouncer sshd\[7086\]: Invalid user pi from 197.155.115.60 port 58844
Sep  5 21:10:07 bouncer sshd\[7086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.115.60 
Sep  5 21:10:07 bouncer sshd\[7088\]: Invalid user pi from 197.155.115.60 port 58846
...
2019-09-06 04:36:24
82.85.143.181 attack
Sep  5 22:01:05 Ubuntu-1404-trusty-64-minimal sshd\[31705\]: Invalid user deploy from 82.85.143.181
Sep  5 22:01:05 Ubuntu-1404-trusty-64-minimal sshd\[31705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.85.143.181
Sep  5 22:01:07 Ubuntu-1404-trusty-64-minimal sshd\[31705\]: Failed password for invalid user deploy from 82.85.143.181 port 21849 ssh2
Sep  5 22:11:34 Ubuntu-1404-trusty-64-minimal sshd\[9638\]: Invalid user test2 from 82.85.143.181
Sep  5 22:11:34 Ubuntu-1404-trusty-64-minimal sshd\[9638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.85.143.181
2019-09-06 04:15:57
123.138.18.35 attackspambots
2019-09-05T20:17:22.968609abusebot-2.cloudsearch.cf sshd\[19955\]: Invalid user steam from 123.138.18.35 port 51476
2019-09-06 04:20:12
216.244.76.218 attack
Sep  5 13:18:47 rb06 sshd[23351]: Failed password for invalid user tempuser from 216.244.76.218 port 42284 ssh2
Sep  5 13:18:47 rb06 sshd[23351]: Received disconnect from 216.244.76.218: 11: Bye Bye [preauth]
Sep  5 13:27:38 rb06 sshd[26526]: Failed password for invalid user vmadmin from 216.244.76.218 port 59248 ssh2
Sep  5 13:27:38 rb06 sshd[26526]: Received disconnect from 216.244.76.218: 11: Bye Bye [preauth]
Sep  5 13:31:56 rb06 sshd[28149]: Failed password for invalid user adminixxxr from 216.244.76.218 port 49352 ssh2
Sep  5 13:31:56 rb06 sshd[28149]: Received disconnect from 216.244.76.218: 11: Bye Bye [preauth]
Sep  5 13:36:08 rb06 sshd[30730]: Failed password for invalid user user from 216.244.76.218 port 39430 ssh2
Sep  5 13:36:09 rb06 sshd[30730]: Received disconnect from 216.244.76.218: 11: Bye Bye [preauth]
Sep  5 13:40:26 rb06 sshd[32259]: Failed password for invalid user ghostname from 216.244.76.218 port 57740 ssh2
Sep  5 13:40:26 rb06 sshd[32259]: Rece........
-------------------------------
2019-09-06 04:21:35
205.185.120.241 attack
fire
2019-09-06 04:56:15
222.188.54.57 attackbotsspam
firewall-block, port(s): 22/tcp
2019-09-06 04:22:21
182.255.62.113 attackspambots
Sep  5 10:29:27 php2 sshd\[31309\]: Invalid user cactiuser from 182.255.62.113
Sep  5 10:29:27 php2 sshd\[31309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.255.62.113
Sep  5 10:29:30 php2 sshd\[31309\]: Failed password for invalid user cactiuser from 182.255.62.113 port 50748 ssh2
Sep  5 10:33:44 php2 sshd\[31711\]: Invalid user tester from 182.255.62.113
Sep  5 10:33:44 php2 sshd\[31711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.255.62.113
2019-09-06 04:34:08
196.189.91.134 attackspambots
firewall-block, port(s): 445/tcp
2019-09-06 04:32:03
58.249.123.38 attack
Sep  5 22:36:16 mail sshd\[28378\]: Invalid user vnc from 58.249.123.38 port 54820
Sep  5 22:36:16 mail sshd\[28378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.123.38
Sep  5 22:36:18 mail sshd\[28378\]: Failed password for invalid user vnc from 58.249.123.38 port 54820 ssh2
Sep  5 22:40:32 mail sshd\[28907\]: Invalid user ubuntu from 58.249.123.38 port 38682
Sep  5 22:40:32 mail sshd\[28907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.123.38
2019-09-06 04:52:16
89.237.192.233 attack
Sep  5 13:26:42 mxgate1 postfix/postscreen[13738]: CONNECT from [89.237.192.233]:16940 to [176.31.12.44]:25
Sep  5 13:26:42 mxgate1 postfix/dnsblog[14425]: addr 89.237.192.233 listed by domain zen.spamhaus.org as 127.0.0.4
Sep  5 13:26:42 mxgate1 postfix/dnsblog[14425]: addr 89.237.192.233 listed by domain zen.spamhaus.org as 127.0.0.3
Sep  5 13:26:42 mxgate1 postfix/dnsblog[14425]: addr 89.237.192.233 listed by domain zen.spamhaus.org as 127.0.0.11
Sep  5 13:26:42 mxgate1 postfix/dnsblog[14424]: addr 89.237.192.233 listed by domain cbl.abuseat.org as 127.0.0.2
Sep  5 13:26:42 mxgate1 postfix/dnsblog[14428]: addr 89.237.192.233 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Sep  5 13:26:42 mxgate1 postfix/dnsblog[14427]: addr 89.237.192.233 listed by domain b.barracudacentral.org as 127.0.0.2
Sep  5 13:26:43 mxgate1 postfix/postscreen[13738]: PREGREET 37 after 0.26 from [89.237.192.233]:16940: EHLO 213-145-145-78.static.ktnet.kg

Sep  5 13:26:43 mxgate1 postfix/posts........
-------------------------------
2019-09-06 04:12:54
167.71.41.24 attackbotsspam
Automated report - ssh fail2ban:
Sep 5 22:11:38 wrong password, user=jenkins, port=40054, ssh2
Sep 5 22:15:26 authentication failure 
Sep 5 22:15:28 wrong password, user=ftptest, port=45508, ssh2
2019-09-06 04:36:53
179.162.11.92 attackbots
400 BAD REQUEST
2019-09-06 04:42:50

Recently Reported IPs

223.109.249.83 76.160.166.197 195.51.250.4 17.15.130.175
223.125.197.3 199.186.143.199 72.136.121.96 168.234.233.222
110.99.229.176 179.240.120.137 161.74.42.118 151.170.135.0
65.235.112.119 205.141.19.213 118.223.128.152 147.33.123.119
124.10.3.182 211.231.163.36 106.216.180.114 205.75.65.142