Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pittsburgh

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.99.53.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17045
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.99.53.64.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032201 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 23 03:19:13 CST 2022
;; MSG SIZE  rcvd: 105
Host info
64.53.99.104.in-addr.arpa domain name pointer a104-99-53-64.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
64.53.99.104.in-addr.arpa	name = a104-99-53-64.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.31.212.107 attackspam
Unauthorized connection attempt from IP address 77.31.212.107 on Port 445(SMB)
2020-04-20 05:25:11
89.42.59.208 attack
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-04-20 05:30:56
149.129.111.199 attackbotsspam
WordPress brute force
2020-04-20 05:45:29
103.131.71.73 attackspambots
Too Many Connections Or General Abuse
2020-04-20 05:33:49
180.215.204.159 attackspam
2020-04-19T22:04:45.113459v22018076590370373 sshd[6296]: Failed password for invalid user u from 180.215.204.159 port 56774 ssh2
2020-04-19T22:15:02.537671v22018076590370373 sshd[5902]: Invalid user tl from 180.215.204.159 port 34798
2020-04-19T22:15:02.545391v22018076590370373 sshd[5902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.215.204.159
2020-04-19T22:15:02.537671v22018076590370373 sshd[5902]: Invalid user tl from 180.215.204.159 port 34798
2020-04-19T22:15:05.488171v22018076590370373 sshd[5902]: Failed password for invalid user tl from 180.215.204.159 port 34798 ssh2
...
2020-04-20 05:44:58
103.131.71.77 attack
Too Many Connections Or General Abuse
2020-04-20 05:23:52
82.13.31.35 attack
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-04-20 05:39:38
46.254.14.61 attack
5x Failed Password
2020-04-20 05:25:36
168.0.81.113 attackspam
Automatic report - Port Scan Attack
2020-04-20 05:49:56
106.12.206.3 attackbots
Apr 19 17:07:24 r.ca sshd[26612]: Failed password for admin from 106.12.206.3 port 58684 ssh2
2020-04-20 05:22:28
218.94.103.226 attack
$f2bV_matches
2020-04-20 05:20:38
5.187.6.176 attack
Fail2Ban Ban Triggered (2)
2020-04-20 05:56:20
111.248.246.3 attackspam
Unauthorized connection attempt from IP address 111.248.246.3 on Port 445(SMB)
2020-04-20 05:36:09
47.52.239.42 attackbots
47.52.239.42 - - [19/Apr/2020:23:28:53 +0300] "POST /wp-login.php HTTP/1.1" 200 2172 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-20 05:46:00
49.234.206.45 attackspam
Apr 19 21:34:53 scw-6657dc sshd[2748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.206.45
Apr 19 21:34:53 scw-6657dc sshd[2748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.206.45
Apr 19 21:34:55 scw-6657dc sshd[2748]: Failed password for invalid user ox from 49.234.206.45 port 48574 ssh2
...
2020-04-20 05:36:57

Recently Reported IPs

104.99.52.126 105.155.109.13 105.197.74.165 105.199.58.237
105.213.105.169 105.213.122.254 105.213.135.232 105.213.151.90
105.213.182.102 93.80.85.219 105.213.186.117 105.213.186.7
105.213.191.147 105.213.65.33 105.213.68.227 9.197.211.50
105.213.73.162 105.213.73.2 105.213.77.102 105.213.77.20