Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Clifton

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.131.26.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.131.26.99.			IN	A

;; AUTHORITY SECTION:
.			243	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032801 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 29 12:05:27 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 99.26.131.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.26.131.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.167.96.249 attackspam
20/3/30@23:54:15: FAIL: Alarm-Network address from=113.167.96.249
...
2020-03-31 13:30:49
167.114.12.201 attackbots
failed_logins
2020-03-31 13:56:10
188.131.217.33 attackbotsspam
fail2ban/Mar 31 03:47:17 h1962932 sshd[19675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.217.33  user=root
Mar 31 03:47:18 h1962932 sshd[19675]: Failed password for root from 188.131.217.33 port 54080 ssh2
Mar 31 03:50:31 h1962932 sshd[19832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.217.33  user=root
Mar 31 03:50:33 h1962932 sshd[19832]: Failed password for root from 188.131.217.33 port 55918 ssh2
Mar 31 03:53:38 h1962932 sshd[19931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.217.33  user=root
Mar 31 03:53:39 h1962932 sshd[19931]: Failed password for root from 188.131.217.33 port 57756 ssh2
2020-03-31 13:55:37
45.12.161.31 attackspambots
2020-03-31T07:07:29.647899v22018076590370373 sshd[22444]: Failed password for root from 45.12.161.31 port 45796 ssh2
2020-03-31T07:11:29.597690v22018076590370373 sshd[1964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.12.161.31  user=root
2020-03-31T07:11:31.283129v22018076590370373 sshd[1964]: Failed password for root from 45.12.161.31 port 60294 ssh2
2020-03-31T07:15:56.480479v22018076590370373 sshd[26123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.12.161.31  user=root
2020-03-31T07:15:58.487007v22018076590370373 sshd[26123]: Failed password for root from 45.12.161.31 port 46560 ssh2
...
2020-03-31 13:32:59
222.186.30.167 attackspam
Mar 31 10:53:26 gw1 sshd[10311]: Failed password for root from 222.186.30.167 port 31820 ssh2
...
2020-03-31 13:57:52
2.61.249.208 attackbotsspam
" "
2020-03-31 13:43:24
82.165.158.242 attack
Try to reach: 
/.env
/administrator
/plugins/system/debug/debug.xml
/administrator/language/en-GB/install.xml
/administrator/help/en-GB/toc.json

{"cdn-loop":["cloudflare"],"cf-connecting-ip":["82.165.158.242"],"user-agent":["Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"],"accept":["*/*"],"cf-visitor":["{\\"scheme\\":\\"https\\"}"],"x-forwarded-proto":["https"],"cf-ipcountry":["DE"],"accept-encoding":["gzip"],"connection":["close"],"x-forwarded-for":["82.165.158.242, 82.165.158.242"]]}
2020-03-31 13:58:38
63.143.57.30 attackspambots
[2020-03-31 01:00:19] NOTICE[1148][C-00019528] chan_sip.c: Call from '' (63.143.57.30:5073) to extension '011972599362540' rejected because extension not found in context 'public'.
[2020-03-31 01:00:19] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-31T01:00:19.251-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972599362540",SessionID="0x7fd82cdb8718",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/63.143.57.30/5073",ACLName="no_extension_match"
[2020-03-31 01:08:38] NOTICE[1148][C-00019533] chan_sip.c: Call from '' (63.143.57.30:5106) to extension '011972599362540' rejected because extension not found in context 'public'.
[2020-03-31 01:08:38] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-31T01:08:38.101-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972599362540",SessionID="0x7fd82cdb8718",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/63.143
...
2020-03-31 13:25:26
129.211.62.131 attackbots
2020-03-29 12:06:42 server sshd[7428]: Failed password for invalid user wyb from 129.211.62.131 port 13918 ssh2
2020-03-31 14:00:15
37.59.66.56 attackbots
3x Failed Password
2020-03-31 13:48:19
91.121.221.195 attackbots
ssh brute force
2020-03-31 13:50:28
49.234.77.54 attack
Mar 31 05:44:29 minden010 sshd[7858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.77.54
Mar 31 05:44:31 minden010 sshd[7858]: Failed password for invalid user name from 49.234.77.54 port 45966 ssh2
Mar 31 05:54:20 minden010 sshd[16051]: Failed password for root from 49.234.77.54 port 42724 ssh2
...
2020-03-31 13:27:24
125.132.73.14 attackspam
Mar 31 00:42:03 NPSTNNYC01T sshd[24348]: Failed password for root from 125.132.73.14 port 49700 ssh2
Mar 31 00:46:03 NPSTNNYC01T sshd[24611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.132.73.14
Mar 31 00:46:05 NPSTNNYC01T sshd[24611]: Failed password for invalid user shen from 125.132.73.14 port 55956 ssh2
...
2020-03-31 13:59:09
203.190.9.138 attackbots
C1,WP GET /wp-login.php
2020-03-31 13:42:29
114.242.245.32 attack
Mar 31 08:50:19 gw1 sshd[5154]: Failed password for root from 114.242.245.32 port 24480 ssh2
...
2020-03-31 13:31:13

Recently Reported IPs

104.131.217.45 104.131.28.96 104.131.29.170 104.131.32.144
104.131.42.95 104.131.54.221 104.131.58.29 104.131.58.99
104.131.63.229 104.131.66.115 104.131.83.133 104.140.108.236
104.140.12.194 104.140.159.49 104.140.63.170 104.143.45.4
104.144.105.194 104.144.125.2 104.144.128.142 104.144.129.214