Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.99.94.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59473
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.99.94.198.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:42:17 CST 2025
;; MSG SIZE  rcvd: 105
Host info
198.94.99.18.in-addr.arpa domain name pointer ec2-18-99-94-198.ap-northeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
198.94.99.18.in-addr.arpa	name = ec2-18-99-94-198.ap-northeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.41.1.2 attackbots
(sshd) Failed SSH login from 104.41.1.2 (BR/Brazil/-): 5 in the last 3600 secs
2020-04-24 18:51:57
121.15.130.190 attack
[ssh] SSH attack
2020-04-24 18:54:15
111.231.143.71 attackspam
SSH login attempts.
2020-04-24 18:48:59
129.146.69.238 attackbots
Invalid user bot from 129.146.69.238 port 47864
2020-04-24 18:53:51
218.250.30.122 attack
port scan and connect, tcp 23 (telnet)
2020-04-24 18:45:46
49.235.120.41 attackspambots
MYH,DEF HEAD /admin.php?c=login
2020-04-24 18:50:17
104.206.128.30 attack
Unauthorized connection attempt detected from IP address 104.206.128.30 to port 2200
2020-04-24 18:37:33
119.28.2.174 attack
Invalid user test from 119.28.2.174 port 56902
2020-04-24 18:57:42
163.53.204.182 attackbotsspam
bruteforce detected
2020-04-24 18:23:08
89.40.120.160 attack
Apr 24 12:03:14 xeon sshd[26080]: Failed password for invalid user test from 89.40.120.160 port 47350 ssh2
2020-04-24 18:34:25
27.115.15.8 attack
(sshd) Failed SSH login from 27.115.15.8 (CN/China/-): 5 in the last 3600 secs
2020-04-24 18:57:14
54.38.180.93 attackspam
Apr 23 07:35:11 lock-38 sshd[1396177]: Invalid user tester from 54.38.180.93 port 44554
Apr 23 07:35:11 lock-38 sshd[1396177]: Failed password for invalid user tester from 54.38.180.93 port 44554 ssh2
Apr 23 07:35:11 lock-38 sshd[1396177]: Disconnected from invalid user tester 54.38.180.93 port 44554 [preauth]
Apr 23 07:43:21 lock-38 sshd[1396420]: Failed password for root from 54.38.180.93 port 47148 ssh2
Apr 23 07:43:21 lock-38 sshd[1396420]: Disconnected from authenticating user root 54.38.180.93 port 47148 [preauth]
...
2020-04-24 18:38:04
107.170.17.129 attackspambots
SSH login attempts.
2020-04-24 18:34:42
171.231.244.86 attack
Attempt to enter my Yahoo account
2020-04-24 18:37:21
106.12.211.33 attackbots
Invalid user sa from 106.12.211.33 port 47716
2020-04-24 18:43:01

Recently Reported IPs

84.51.73.59 2.206.156.5 74.145.106.227 57.241.147.121
174.85.106.204 209.200.137.156 108.138.4.222 76.138.140.206
28.95.198.196 17.29.211.76 234.239.101.91 65.244.163.115
182.18.170.255 206.255.232.39 247.149.180.230 120.163.69.137
137.228.89.193 192.214.178.139 119.151.220.63 91.77.187.125