Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: MCI Communications Services, Inc. d/b/a Verizon Business

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.4.47.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38484
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;100.4.47.199.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 23 00:50:42 +08 2019
;; MSG SIZE  rcvd: 116

Host info
199.47.4.100.in-addr.arpa domain name pointer pool-100-4-47-199.nrflva.east.verizon.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
199.47.4.100.in-addr.arpa	name = pool-100-4-47-199.nrflva.east.verizon.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
84.53.198.125 attackspambots
Automatic report - Port Scan Attack
2020-02-21 22:51:12
51.15.1.221 attack
02/21/2020-14:19:30.058822 51.15.1.221 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 69
2020-02-21 22:51:35
222.124.18.155 attackbots
firewall-block, port(s): 22/tcp
2020-02-21 23:11:53
110.164.129.40 attackbots
suspicious action Fri, 21 Feb 2020 10:19:12 -0300
2020-02-21 23:06:24
61.60.204.226 attackbots
Fail2Ban Ban Triggered
2020-02-21 22:33:52
159.65.4.64 attackbots
Feb 21 15:29:14 vps647732 sshd[23260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.4.64
Feb 21 15:29:16 vps647732 sshd[23260]: Failed password for invalid user ptao from 159.65.4.64 port 43402 ssh2
...
2020-02-21 22:37:10
141.155.177.180 attackbotsspam
suspicious action Fri, 21 Feb 2020 10:19:23 -0300
2020-02-21 22:58:26
118.173.159.65 attack
1582291156 - 02/21/2020 14:19:16 Host: 118.173.159.65/118.173.159.65 Port: 445 TCP Blocked
2020-02-21 23:03:40
51.68.176.49 attackbots
Feb 21 15:50:08 ns381471 sshd[9751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.176.49
Feb 21 15:50:10 ns381471 sshd[9751]: Failed password for invalid user saed2 from 51.68.176.49 port 41202 ssh2
2020-02-21 23:04:10
89.248.172.90 attackspambots
Excessive Port-Scanning
2020-02-21 23:06:40
207.154.246.51 attack
Feb 21 09:39:42 ny01 sshd[8495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.246.51
Feb 21 09:39:44 ny01 sshd[8495]: Failed password for invalid user 12345 from 207.154.246.51 port 59441 ssh2
Feb 21 09:42:04 ny01 sshd[9435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.246.51
2020-02-21 23:15:13
45.133.99.130 attackbots
Feb 21 15:33:04 mail postfix/smtpd\[17975\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 21 16:13:43 mail postfix/smtpd\[18981\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 21 16:14:01 mail postfix/smtpd\[18981\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 21 16:14:48 mail postfix/smtpd\[18981\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-02-21 23:14:51
64.225.41.232 attackspambots
" "
2020-02-21 22:35:16
5.135.165.51 attack
suspicious action Fri, 21 Feb 2020 10:19:46 -0300
2020-02-21 22:38:37
186.117.156.180 attackbotsspam
1582291137 - 02/21/2020 14:18:57 Host: 186.117.156.180/186.117.156.180 Port: 445 TCP Blocked
2020-02-21 23:15:55

Recently Reported IPs

165.21.115.132 186.107.255.208 95.154.200.183 166.69.242.27
110.105.235.228 163.172.29.223 179.71.129.188 136.159.112.241
142.233.202.126 70.95.81.134 173.177.76.171 95.175.14.136
122.184.101.49 13.22.233.252 162.220.166.192 150.199.0.145
103.1.24.107 165.255.68.101 182.52.29.174 46.229.215.169