Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.86.94.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.86.94.99.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052501 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 26 04:40:30 CST 2024
;; MSG SIZE  rcvd: 105
Host info
99.94.86.104.in-addr.arpa domain name pointer a104-86-94-99.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.94.86.104.in-addr.arpa	name = a104-86-94-99.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
35.175.212.58 attack
Sep 12 20:35:20 roki sshd[1923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.175.212.58  user=root
Sep 12 20:35:21 roki sshd[1923]: Failed password for root from 35.175.212.58 port 54434 ssh2
Sep 12 21:03:44 roki sshd[3942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.175.212.58  user=root
Sep 12 21:03:47 roki sshd[3942]: Failed password for root from 35.175.212.58 port 37208 ssh2
Sep 12 21:08:33 roki sshd[4291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.175.212.58  user=root
...
2020-09-13 04:27:28
23.129.64.204 attackbots
Scan or attack attempt on email service.
2020-09-13 04:25:19
142.93.217.121 attackbotsspam
Sep 12 21:50:47 web-main sshd[2096139]: Failed password for root from 142.93.217.121 port 57834 ssh2
Sep 12 21:57:33 web-main sshd[2097064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.217.121  user=root
Sep 12 21:57:35 web-main sshd[2097064]: Failed password for root from 142.93.217.121 port 60064 ssh2
2020-09-13 04:14:34
185.56.80.222 attack
RDP Bruteforce
2020-09-13 04:01:19
116.236.189.134 attackspam
invalid user
2020-09-13 04:21:16
190.80.217.151 attackspam
Unauthorized connection attempt from IP address 190.80.217.151 on Port 445(SMB)
2020-09-13 04:15:53
45.141.84.145 attack
Port scan on 12 port(s): 8047 8177 8182 8198 8260 8515 8563 8784 9036 9199 9248 9514
2020-09-13 03:56:17
111.175.186.150 attackbots
Sep 12 20:01:09 minden010 sshd[12537]: Failed password for root from 111.175.186.150 port 32663 ssh2
Sep 12 20:02:38 minden010 sshd[13009]: Failed password for root from 111.175.186.150 port 47522 ssh2
...
2020-09-13 04:25:35
211.100.61.29 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-09-13 04:27:57
49.233.85.15 attack
Sep 12 19:59:32 [host] sshd[28058]: pam_unix(sshd:
Sep 12 19:59:34 [host] sshd[28058]: Failed passwor
Sep 12 20:01:14 [host] sshd[28096]: Invalid user g
2020-09-13 03:58:46
66.37.4.162 attackspambots
Sep 12 16:51:47 XXX sshd[60844]: Invalid user admin from 66.37.4.162 port 58928
2020-09-13 04:22:43
45.145.67.171 attackbots
RDP Bruteforce
2020-09-13 04:04:09
115.96.143.200 attackbotsspam
firewall-block, port(s): 1023/tcp
2020-09-13 03:57:35
103.10.87.54 attackspam
2020-09-12T14:47:36.170252yoshi.linuxbox.ninja sshd[2358425]: Invalid user p from 103.10.87.54 port 54673
2020-09-12T14:47:38.233821yoshi.linuxbox.ninja sshd[2358425]: Failed password for invalid user p from 103.10.87.54 port 54673 ssh2
2020-09-12T14:49:48.058336yoshi.linuxbox.ninja sshd[2359641]: Invalid user thai007xng from 103.10.87.54 port 33806
...
2020-09-13 04:10:21
124.193.224.11 attackspambots
prod6
...
2020-09-13 04:16:54

Recently Reported IPs

246.254.243.110 214.161.43.23 229.188.110.162 192.78.164.179
146.225.89.184 241.4.111.157 116.125.89.205 137.9.34.10
127.31.114.158 109.132.137.106 131.31.13.65 134.233.4.51
167.186.206.237 18.170.2.81 101.3.201.88 191.35.45.144
207.61.35.188 180.61.130.25 146.72.180.186 40.135.23.24