Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: AT&T Corp.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
port scan and connect, tcp 443 (https)
2020-09-18 20:23:27
attack
port scan and connect, tcp 443 (https)
2020-09-18 12:42:07
attackspam
port scan and connect, tcp 443 (https)
2020-09-18 02:56:23
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.216.45.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;107.216.45.99.			IN	A

;; AUTHORITY SECTION:
.			446	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091701 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 18 02:56:19 CST 2020
;; MSG SIZE  rcvd: 117
Host info
99.45.216.107.in-addr.arpa domain name pointer 107-216-45-99.lightspeed.austtx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.45.216.107.in-addr.arpa	name = 107-216-45-99.lightspeed.austtx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
223.97.177.41 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-28 08:28:47
129.28.106.99 attack
Feb 27 13:38:04 hanapaa sshd\[23552\]: Invalid user es from 129.28.106.99
Feb 27 13:38:04 hanapaa sshd\[23552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.106.99
Feb 27 13:38:06 hanapaa sshd\[23552\]: Failed password for invalid user es from 129.28.106.99 port 55964 ssh2
Feb 27 13:43:57 hanapaa sshd\[24069\]: Invalid user jenkins from 129.28.106.99
Feb 27 13:43:57 hanapaa sshd\[24069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.106.99
2020-02-28 07:53:18
132.232.168.65 attackbotsspam
PHP Info File Request - Possible PHP Version Scan
2020-02-28 08:12:09
112.217.225.61 attackbots
Invalid user bot from 112.217.225.61 port 27404
2020-02-28 08:21:40
94.102.56.215 attack
Fail2Ban Ban Triggered
2020-02-28 08:23:45
5.65.161.188 attackbotsspam
Automatic report - Port Scan Attack
2020-02-28 08:19:46
185.53.88.128 attack
$f2bV_matches
2020-02-28 07:49:23
82.64.129.178 attack
SSH invalid-user multiple login try
2020-02-28 08:12:59
222.186.173.226 attack
Feb 27 21:06:16 firewall sshd[10760]: Failed password for root from 222.186.173.226 port 29252 ssh2
Feb 27 21:06:27 firewall sshd[10760]: error: maximum authentication attempts exceeded for root from 222.186.173.226 port 29252 ssh2 [preauth]
Feb 27 21:06:27 firewall sshd[10760]: Disconnecting: Too many authentication failures [preauth]
...
2020-02-28 08:09:39
45.10.24.60 attackspambots
Invalid user fredportela from 45.10.24.60 port 45474
2020-02-28 08:02:34
23.116.185.114 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-28 08:14:58
104.236.239.60 attackbots
Feb 27 12:36:47 hpm sshd\[9756\]: Invalid user ubuntu from 104.236.239.60
Feb 27 12:36:47 hpm sshd\[9756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.239.60
Feb 27 12:36:49 hpm sshd\[9756\]: Failed password for invalid user ubuntu from 104.236.239.60 port 44388 ssh2
Feb 27 12:46:24 hpm sshd\[10541\]: Invalid user oradev from 104.236.239.60
Feb 27 12:46:24 hpm sshd\[10541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.239.60
2020-02-28 08:15:41
202.88.241.107 attackbotsspam
Invalid user user from 202.88.241.107 port 43604
2020-02-28 08:17:35
74.7.85.62 attack
Feb 27 13:30:54 eddieflores sshd\[20291\]: Invalid user precos from 74.7.85.62
Feb 27 13:30:54 eddieflores sshd\[20291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74-7-85-62.customerip.birch.net
Feb 27 13:30:56 eddieflores sshd\[20291\]: Failed password for invalid user precos from 74.7.85.62 port 35250 ssh2
Feb 27 13:39:53 eddieflores sshd\[21026\]: Invalid user redmine from 74.7.85.62
Feb 27 13:39:53 eddieflores sshd\[21026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74-7-85-62.customerip.birch.net
2020-02-28 07:56:34
202.137.20.58 attackspambots
Feb 27 23:09:49 raspberrypi sshd\[26204\]: Invalid user john from 202.137.20.58Feb 27 23:09:51 raspberrypi sshd\[26204\]: Failed password for invalid user john from 202.137.20.58 port 58543 ssh2Feb 27 23:13:58 raspberrypi sshd\[26352\]: Invalid user user10 from 202.137.20.58
...
2020-02-28 08:03:31

Recently Reported IPs

185.239.242.99 114.227.111.107 113.184.155.40 103.194.104.98
171.8.238.252 216.245.216.170 200.144.152.17 113.111.48.150
16.219.168.111 132.99.232.148 241.25.155.240 2804:14c:3b85:ccc:498b:1700:592d:9015
8.148.246.231 186.48.57.21 92.39.68.139 179.32.131.97
79.127.116.82 106.104.88.38 187.233.20.85 61.183.158.70