Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.200.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25042
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.99.200.58.			IN	A

;; AUTHORITY SECTION:
.			577	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:44:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 58.200.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 58.200.99.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
67.205.162.223 attackspam
*Port Scan* detected from 67.205.162.223 (US/United States/New Jersey/North Bergen/-). 4 hits in the last 266 seconds
2020-03-21 12:09:56
111.21.99.227 attackbotsspam
Mar 20 22:07:17 server1 sshd\[32206\]: Invalid user sakurai from 111.21.99.227
Mar 20 22:07:17 server1 sshd\[32206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.21.99.227 
Mar 20 22:07:19 server1 sshd\[32206\]: Failed password for invalid user sakurai from 111.21.99.227 port 55888 ssh2
Mar 20 22:14:09 server1 sshd\[1744\]: Invalid user massimo from 111.21.99.227
Mar 20 22:14:09 server1 sshd\[1744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.21.99.227 
...
2020-03-21 12:16:11
186.84.172.25 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-21 12:00:25
167.172.145.142 attackbots
Mar 20 18:05:20 wbs sshd\[29655\]: Invalid user ic from 167.172.145.142
Mar 20 18:05:20 wbs sshd\[29655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.145.142
Mar 20 18:05:22 wbs sshd\[29655\]: Failed password for invalid user ic from 167.172.145.142 port 37040 ssh2
Mar 20 18:10:29 wbs sshd\[30122\]: Invalid user ftpuser1 from 167.172.145.142
Mar 20 18:10:29 wbs sshd\[30122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.145.142
2020-03-21 12:24:13
191.101.44.206 attackspambots
Mar 21 00:18:55 NPSTNNYC01T sshd[12609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.101.44.206
Mar 21 00:18:57 NPSTNNYC01T sshd[12609]: Failed password for invalid user sj from 191.101.44.206 port 50832 ssh2
Mar 21 00:22:59 NPSTNNYC01T sshd[12884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.101.44.206
...
2020-03-21 12:31:46
216.189.157.214 attackspam
*Port Scan* detected from 216.189.157.214 (US/United States/West Virginia/Gassaway/-). 4 hits in the last 95 seconds
2020-03-21 12:11:30
162.243.128.197 attackspam
*Port Scan* detected from 162.243.128.197 (US/United States/California/San Francisco/zg-0312c-31.stretchoid.com). 4 hits in the last 296 seconds
2020-03-21 12:13:01
112.85.42.181 attackspam
Mar 21 05:18:54 minden010 sshd[5730]: Failed password for root from 112.85.42.181 port 42332 ssh2
Mar 21 05:19:06 minden010 sshd[5730]: error: maximum authentication attempts exceeded for root from 112.85.42.181 port 42332 ssh2 [preauth]
Mar 21 05:19:17 minden010 sshd[5890]: Failed password for root from 112.85.42.181 port 30512 ssh2
...
2020-03-21 12:30:35
142.93.232.102 attackspambots
2020-03-21T04:00:14.143454shield sshd\[26151\]: Invalid user gmodserver from 142.93.232.102 port 46170
2020-03-21T04:00:14.152184shield sshd\[26151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.102
2020-03-21T04:00:15.803184shield sshd\[26151\]: Failed password for invalid user gmodserver from 142.93.232.102 port 46170 ssh2
2020-03-21T04:04:06.625429shield sshd\[27267\]: Invalid user ilse from 142.93.232.102 port 38340
2020-03-21T04:04:06.629239shield sshd\[27267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.102
2020-03-21 12:18:09
106.13.56.17 attackspam
Mar 20 22:00:47 combo sshd[25521]: Invalid user mysql2 from 106.13.56.17 port 52998
Mar 20 22:00:50 combo sshd[25521]: Failed password for invalid user mysql2 from 106.13.56.17 port 52998 ssh2
Mar 20 22:05:05 combo sshd[25859]: Invalid user zjcl from 106.13.56.17 port 60204
...
2020-03-21 10:41:28
41.234.66.22 attack
Mar 21 05:07:11 localhost sshd\[13404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.234.66.22  user=root
Mar 21 05:07:13 localhost sshd\[13404\]: Failed password for root from 41.234.66.22 port 52004 ssh2
Mar 21 05:07:33 localhost sshd\[13406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.234.66.22  user=root
Mar 21 05:07:35 localhost sshd\[13406\]: Failed password for root from 41.234.66.22 port 43299 ssh2
Mar 21 05:08:01 localhost sshd\[13408\]: Invalid user user from 41.234.66.22
...
2020-03-21 12:20:31
51.178.81.239 attack
Mar 21 04:53:14 markkoudstaal sshd[18929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.81.239
Mar 21 04:53:16 markkoudstaal sshd[18929]: Failed password for invalid user hk from 51.178.81.239 port 55284 ssh2
Mar 21 04:55:03 markkoudstaal sshd[19167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.81.239
2020-03-21 12:15:55
113.175.139.25 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 21-03-2020 03:55:15.
2020-03-21 12:04:31
112.84.61.17 attackspam
Mar 21 05:53:39 elektron postfix/smtpd\[24523\]: NOQUEUE: reject: RCPT from unknown\[112.84.61.17\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[112.84.61.17\]\; from=\ to=\ proto=ESMTP helo=\
Mar 21 05:54:33 elektron postfix/smtpd\[24523\]: NOQUEUE: reject: RCPT from unknown\[112.84.61.17\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[112.84.61.17\]\; from=\ to=\ proto=ESMTP helo=\
Mar 21 05:55:20 elektron postfix/smtpd\[24523\]: NOQUEUE: reject: RCPT from unknown\[112.84.61.17\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[112.84.61.17\]\; from=\ to=\ proto=ESMTP helo=\
Mar 21 05:56:17 elektron postfix/smtpd\[24523\]: NOQUEUE: reject: RCPT from unknown\[112.84.61.17\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[112.84.61.17\]\; from=\ to=\ proto=ESMTP helo=\
Mar
2020-03-21 12:07:08
111.202.66.67 attack
Mar 21 04:39:04 ovpn sshd\[29187\]: Invalid user rb from 111.202.66.67
Mar 21 04:39:04 ovpn sshd\[29187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.202.66.67
Mar 21 04:39:06 ovpn sshd\[29187\]: Failed password for invalid user rb from 111.202.66.67 port 59306 ssh2
Mar 21 04:55:00 ovpn sshd\[462\]: Invalid user eduard from 111.202.66.67
Mar 21 04:55:00 ovpn sshd\[462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.202.66.67
2020-03-21 12:18:35

Recently Reported IPs

114.99.200.51 114.99.200.8 114.99.200.76 114.99.200.75
115.237.81.167 114.99.200.91 114.99.201.1 114.99.201.105
114.99.201.132 114.99.201.128 114.99.201.106 114.99.201.136
114.99.201.157 114.99.201.16 114.99.201.182 114.99.201.162
114.99.201.167 115.237.81.176 114.99.21.84 114.99.21.88