Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.99.122.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.99.122.218.			IN	A

;; AUTHORITY SECTION:
.			426	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 10:25:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 218.122.99.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 218.122.99.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.20.87.98 attackspam
Automatic report - Banned IP Access
2019-11-16 19:46:05
193.31.24.113 attack
11/16/2019-12:53:47.528320 193.31.24.113 Protocol: 6 ET GAMES MINECRAFT Server response outbound
2019-11-16 19:54:22
103.81.86.38 attackbots
103.81.86.38 - - \[16/Nov/2019:08:10:47 +0000\] "POST /wp/wp-login.php HTTP/1.1" 200 4205 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.81.86.38 - - \[16/Nov/2019:08:10:49 +0000\] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-16 19:48:04
106.13.38.246 attackspam
Nov 16 03:36:59 mockhub sshd[2364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.38.246
Nov 16 03:37:01 mockhub sshd[2364]: Failed password for invalid user ts3bot from 106.13.38.246 port 52642 ssh2
...
2019-11-16 19:39:10
172.93.100.154 attack
Portscan or hack attempt detected by psad/fwsnort
2019-11-16 19:25:40
106.12.22.23 attackspam
SSH Brute Force, server-1 sshd[3483]: Failed password for invalid user dynamics from 106.12.22.23 port 54756 ssh2
2019-11-16 19:28:04
1.255.153.167 attackbotsspam
Nov 16 07:59:47 firewall sshd[17776]: Failed password for invalid user Aaron from 1.255.153.167 port 57144 ssh2
Nov 16 08:04:15 firewall sshd[17851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.255.153.167  user=daemon
Nov 16 08:04:17 firewall sshd[17851]: Failed password for daemon from 1.255.153.167 port 46372 ssh2
...
2019-11-16 19:57:09
195.78.63.197 attack
Tried sshing with brute force.
2019-11-16 19:45:00
206.189.134.14 attackbots
206.189.134.14 - - \[16/Nov/2019:11:41:06 +0000\] "POST /wp/wp-login.php HTTP/1.1" 200 4205 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.134.14 - - \[16/Nov/2019:11:41:08 +0000\] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-16 19:59:43
222.186.190.2 attackspambots
SSH Brute-Force attacks
2019-11-16 20:05:47
45.234.7.154 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-16 19:55:32
81.28.100.115 attackbots
Nov 16 07:20:41 smtp postfix/smtpd[30703]: NOQUEUE: reject: RCPT from wry.shrewdmhealth.com[81.28.100.115]: 554 5.7.1 Service unavailable; Client host [81.28.100.115] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
...
2019-11-16 20:05:20
112.161.203.170 attack
2019-11-16T11:17:27.242379abusebot-7.cloudsearch.cf sshd\[10781\]: Invalid user schlussel from 112.161.203.170 port 45784
2019-11-16 19:27:23
85.11.48.222 attackbots
Port scan
2019-11-16 19:26:53
106.12.21.212 attackspam
k+ssh-bruteforce
2019-11-16 20:00:06

Recently Reported IPs

118.99.122.216 118.99.122.220 118.99.122.225 118.99.122.226
118.99.122.228 118.99.122.230 118.99.122.232 118.99.122.235
118.99.122.236 118.99.122.238 118.99.122.242 118.99.122.244
118.99.122.246 118.99.122.249 118.99.122.25 118.99.122.250
118.99.122.252 118.99.122.254 118.99.122.27 118.99.122.28