Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.231.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42626
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.231.99.			IN	A

;; AUTHORITY SECTION:
.			59	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 05:37:58 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 99.231.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.231.18.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.122.249.203 attack
Unauthorized connection attempt detected from IP address 200.122.249.203 to port 2220 [J]
2020-01-06 22:58:51
91.121.211.59 attackbotsspam
Unauthorized connection attempt detected from IP address 91.121.211.59 to port 2220 [J]
2020-01-06 22:44:32
132.232.112.25 attackspambots
Unauthorized connection attempt detected from IP address 132.232.112.25 to port 2220 [J]
2020-01-06 22:38:35
217.112.128.222 attack
Postfix RBL failed
2020-01-06 22:38:04
31.147.227.19 attack
proto=tcp  .  spt=59976  .  dpt=25  .     (Found on   Dark List de Jan 06)     (320)
2020-01-06 22:31:57
118.249.42.206 attack
Unauthorised access (Jan  6) SRC=118.249.42.206 LEN=40 TTL=53 ID=54899 TCP DPT=8080 WINDOW=3982 SYN
2020-01-06 22:40:07
60.250.31.107 attackbots
Unauthorized connection attempt detected from IP address 60.250.31.107 to port 2220 [J]
2020-01-06 22:42:27
182.61.182.50 attackspambots
Unauthorized connection attempt detected from IP address 182.61.182.50 to port 2220 [J]
2020-01-06 23:17:22
218.92.0.212 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Failed password for root from 218.92.0.212 port 6073 ssh2
Failed password for root from 218.92.0.212 port 6073 ssh2
Failed password for root from 218.92.0.212 port 6073 ssh2
Failed password for root from 218.92.0.212 port 6073 ssh2
2020-01-06 22:51:03
222.186.15.91 attackbotsspam
Jan  6 15:58:45 vmanager6029 sshd\[30841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91  user=root
Jan  6 15:58:48 vmanager6029 sshd\[30841\]: Failed password for root from 222.186.15.91 port 24024 ssh2
Jan  6 15:58:50 vmanager6029 sshd\[30841\]: Failed password for root from 222.186.15.91 port 24024 ssh2
2020-01-06 23:05:42
103.1.93.63 attackspambots
Jan  6 13:14:39 flomail dovecot: imap-login: Disconnected (auth failed, 1 attempts in 15 secs): user=, method=PLAIN, rip=103.1.93.63, lip=10.140.194.78, TLS, session=
2020-01-06 22:33:42
107.189.11.11 attackbotsspam
Unauthorized connection attempt detected from IP address 107.189.11.11 to port 22
2020-01-06 23:12:11
222.186.175.23 attackspambots
2020-01-06T15:49:13.494890scmdmz1 sshd[15081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
2020-01-06T15:49:15.317998scmdmz1 sshd[15081]: Failed password for root from 222.186.175.23 port 43761 ssh2
2020-01-06T15:49:17.333768scmdmz1 sshd[15081]: Failed password for root from 222.186.175.23 port 43761 ssh2
2020-01-06T15:49:13.494890scmdmz1 sshd[15081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
2020-01-06T15:49:15.317998scmdmz1 sshd[15081]: Failed password for root from 222.186.175.23 port 43761 ssh2
2020-01-06T15:49:17.333768scmdmz1 sshd[15081]: Failed password for root from 222.186.175.23 port 43761 ssh2
2020-01-06T15:49:13.494890scmdmz1 sshd[15081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
2020-01-06T15:49:15.317998scmdmz1 sshd[15081]: Failed password for root from 222.186.175.23 port 43761 ssh2
2
2020-01-06 22:50:30
189.112.109.185 attack
Jan  6 15:22:39 plex sshd[23619]: Invalid user hcf from 189.112.109.185 port 44960
2020-01-06 22:52:28
129.204.11.162 attack
$f2bV_matches
2020-01-06 22:46:19

Recently Reported IPs

104.18.230.99 104.18.232.12 104.18.233.12 104.18.234.12
104.18.235.12 104.18.235.225 104.18.235.49 104.18.236.225
104.18.236.235 104.18.236.49 104.18.24.117 104.18.24.136
104.18.24.147 104.18.24.163 104.18.24.168 5.114.164.219
104.18.24.170 104.18.24.195 104.18.24.213 104.18.24.22