Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.242.99.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.242.99.106.			IN	A

;; AUTHORITY SECTION:
.			226	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 12:23:08 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 106.99.242.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.99.242.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.70.121.210 attack
2019-12-23T19:04:59.592511shield sshd\[20729\]: Invalid user abcdefghijklmnopqrst from 148.70.121.210 port 48560
2019-12-23T19:04:59.596864shield sshd\[20729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.121.210
2019-12-23T19:05:01.476514shield sshd\[20729\]: Failed password for invalid user abcdefghijklmnopqrst from 148.70.121.210 port 48560 ssh2
2019-12-23T19:11:50.813072shield sshd\[22146\]: Invalid user 123456 from 148.70.121.210 port 54176
2019-12-23T19:11:50.817930shield sshd\[22146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.121.210
2019-12-24 03:32:03
150.109.147.145 attackspambots
$f2bV_matches
2019-12-24 03:24:14
169.239.176.231 attackspam
DATE:2019-12-23 15:55:50, IP:169.239.176.231, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-12-24 03:37:00
125.137.191.215 attack
Dec 23 05:51:28 tdfoods sshd\[22357\]: Invalid user nenseter from 125.137.191.215
Dec 23 05:51:28 tdfoods sshd\[22357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.137.191.215
Dec 23 05:51:30 tdfoods sshd\[22357\]: Failed password for invalid user nenseter from 125.137.191.215 port 59984 ssh2
Dec 23 05:57:30 tdfoods sshd\[22912\]: Invalid user alden from 125.137.191.215
Dec 23 05:57:30 tdfoods sshd\[22912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.137.191.215
2019-12-24 03:14:41
129.204.45.214 attackbotsspam
Apr 16 17:46:12 yesfletchmain sshd\[16521\]: Invalid user weblogic from 129.204.45.214 port 55994
Apr 16 17:46:12 yesfletchmain sshd\[16521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.45.214
Apr 16 17:46:14 yesfletchmain sshd\[16521\]: Failed password for invalid user weblogic from 129.204.45.214 port 55994 ssh2
Apr 16 17:49:35 yesfletchmain sshd\[16796\]: Invalid user aguie from 129.204.45.214 port 54908
Apr 16 17:49:35 yesfletchmain sshd\[16796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.45.214
...
2019-12-24 03:33:18
37.195.50.41 attackspambots
Dec 23 15:48:23 hcbbdb sshd\[415\]: Invalid user passwd12345677 from 37.195.50.41
Dec 23 15:48:23 hcbbdb sshd\[415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=l37-195-50-41.novotelecom.ru
Dec 23 15:48:25 hcbbdb sshd\[415\]: Failed password for invalid user passwd12345677 from 37.195.50.41 port 45494 ssh2
Dec 23 15:55:04 hcbbdb sshd\[1270\]: Invalid user duire from 37.195.50.41
Dec 23 15:55:04 hcbbdb sshd\[1270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=l37-195-50-41.novotelecom.ru
2019-12-24 03:13:02
124.156.204.178 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 03:33:44
80.211.254.244 attackspam
ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak
2019-12-24 03:31:30
129.204.40.157 attack
Jun  2 17:35:11 yesfletchmain sshd\[4091\]: Invalid user oe from 129.204.40.157 port 50666
Jun  2 17:35:11 yesfletchmain sshd\[4091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.40.157
Jun  2 17:35:13 yesfletchmain sshd\[4091\]: Failed password for invalid user oe from 129.204.40.157 port 50666 ssh2
Jun  2 17:41:55 yesfletchmain sshd\[4529\]: Invalid user test from 129.204.40.157 port 37436
Jun  2 17:41:55 yesfletchmain sshd\[4529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.40.157
...
2019-12-24 03:38:32
124.156.240.118 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 03:29:29
31.134.19.218 attackbotsspam
1577112968 - 12/23/2019 15:56:08 Host: 31.134.19.218/31.134.19.218 Port: 445 TCP Blocked
2019-12-24 03:19:36
114.112.58.134 attackspambots
Unauthorized SSH login attempts
2019-12-24 03:43:48
139.219.100.94 attackspambots
2019-12-23T15:58:57.815085shield sshd\[9215\]: Invalid user zamarian from 139.219.100.94 port 37638
2019-12-23T15:58:57.819676shield sshd\[9215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.100.94
2019-12-23T15:58:59.353912shield sshd\[9215\]: Failed password for invalid user zamarian from 139.219.100.94 port 37638 ssh2
2019-12-23T16:04:40.720069shield sshd\[11000\]: Invalid user ppppp from 139.219.100.94 port 59598
2019-12-23T16:04:40.724156shield sshd\[11000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.100.94
2019-12-24 03:26:49
149.202.180.143 attack
2019-12-23T17:00:31.477442  sshd[21978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.180.143  user=root
2019-12-23T17:00:33.247764  sshd[21978]: Failed password for root from 149.202.180.143 port 41914 ssh2
2019-12-23T17:05:55.945237  sshd[22083]: Invalid user dog from 149.202.180.143 port 43809
2019-12-23T17:05:55.956746  sshd[22083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.180.143
2019-12-23T17:05:55.945237  sshd[22083]: Invalid user dog from 149.202.180.143 port 43809
2019-12-23T17:05:57.541424  sshd[22083]: Failed password for invalid user dog from 149.202.180.143 port 43809 ssh2
...
2019-12-24 03:47:11
66.96.246.195 attackbotsspam
Unauthorized connection attempt detected from IP address 66.96.246.195 to port 445
2019-12-24 03:46:55

Recently Reported IPs

117.242.99.109 117.242.99.160 117.242.99.139 117.242.99.44
117.242.99.92 117.242.99.31 114.99.234.124 117.242.99.182
117.242.99.212 117.242.99.34 117.242.99.71 117.243.251.96
117.244.101.63 117.244.103.96 117.244.100.70 117.244.108.242
117.244.106.243 114.99.234.126 117.244.100.72 117.244.15.1