Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.20.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.99.20.90.			IN	A

;; AUTHORITY SECTION:
.			271	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:44:17 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 90.20.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 90.20.99.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.26.75.58 attackspambots
Jul 18 11:16:19 TORMINT sshd\[4162\]: Invalid user unknown from 36.26.75.58
Jul 18 11:16:19 TORMINT sshd\[4162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.75.58
Jul 18 11:16:21 TORMINT sshd\[4162\]: Failed password for invalid user unknown from 36.26.75.58 port 46516 ssh2
...
2019-07-18 23:29:06
123.27.3.61 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2019-07-18 23:46:48
191.181.12.45 attack
Jul 18 19:06:22 localhost sshd[8134]: Invalid user a from 191.181.12.45 port 41898
...
2019-07-18 23:15:36
78.58.92.166 attackbots
Honeypot attack, port: 23, PTR: 78-58-92-166.static.zebra.lt.
2019-07-19 00:13:16
162.144.72.163 attackspambots
Jul 18 17:02:52 XXX sshd[51189]: Invalid user kayten from 162.144.72.163 port 38522
2019-07-19 00:16:16
1.175.81.178 attackspambots
Honeypot attack, port: 23, PTR: 1-175-81-178.dynamic-ip.hinet.net.
2019-07-19 00:18:43
36.92.158.118 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-19 00:09:20
198.27.67.17 attackbots
Automatic report - Banned IP Access
2019-07-18 23:42:06
81.215.205.211 attackbotsspam
Honeypot attack, port: 445, PTR: 81.215.205.211.dynamic.ttnet.com.tr.
2019-07-19 00:10:58
91.15.222.238 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-19 00:12:48
61.12.84.13 attackspambots
Jul 18 12:48:04 legacy sshd[13655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.84.13
Jul 18 12:48:07 legacy sshd[13655]: Failed password for invalid user cop from 61.12.84.13 port 47226 ssh2
Jul 18 12:54:03 legacy sshd[13851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.84.13
...
2019-07-18 23:55:00
89.133.103.216 attack
Jul 18 17:57:23 vps691689 sshd[9032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.133.103.216
Jul 18 17:57:25 vps691689 sshd[9032]: Failed password for invalid user sysadm from 89.133.103.216 port 43282 ssh2
Jul 18 18:02:25 vps691689 sshd[9119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.133.103.216
...
2019-07-19 00:15:19
111.77.113.47 attackbotsspam
2019-07-18T12:53:51.076324mail01 postfix/smtpd[26227]: warning: unknown[111.77.113.47]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-18T12:54:00.135727mail01 postfix/smtpd[1470]: warning: unknown[111.77.113.47]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-18T12:54:19.029805mail01 postfix/smtpd[25111]: warning: unknown[111.77.113.47]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-18 23:32:19
125.212.233.50 attack
Jul 18 17:07:36 MainVPS sshd[20097]: Invalid user postgres from 125.212.233.50 port 50832
Jul 18 17:07:36 MainVPS sshd[20097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.233.50
Jul 18 17:07:36 MainVPS sshd[20097]: Invalid user postgres from 125.212.233.50 port 50832
Jul 18 17:07:39 MainVPS sshd[20097]: Failed password for invalid user postgres from 125.212.233.50 port 50832 ssh2
Jul 18 17:14:41 MainVPS sshd[20775]: Invalid user b from 125.212.233.50 port 48496
...
2019-07-18 23:30:08
113.161.150.152 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 08:19:17,606 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.161.150.152)
2019-07-18 23:33:36

Recently Reported IPs

114.99.20.88 114.99.20.9 114.99.200.124 114.99.20.94
115.237.81.159 114.99.200.177 114.99.200.217 114.99.200.150
114.99.200.198 114.99.200.34 114.99.200.232 114.99.200.240
114.99.200.51 114.99.200.58 114.99.200.8 114.99.200.76
114.99.200.75 115.237.81.167 114.99.200.91 114.99.201.1