Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.118.122.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61828
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.118.122.99.			IN	A

;; AUTHORITY SECTION:
.			325	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:58:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
99.122.118.128.in-addr.arpa domain name pointer pennstatehealth-web.vmhost.psu.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.122.118.128.in-addr.arpa	name = pennstatehealth-web.vmhost.psu.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.253.197.229 attackspambots
Unauthorized connection attempt detected from IP address 120.253.197.229 to port 23 [J]
2020-01-07 00:07:42
173.21.127.120 attackbots
Jan  6 11:12:45 vps46666688 sshd[17315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.21.127.120
Jan  6 11:12:47 vps46666688 sshd[17315]: Failed password for invalid user ansible from 173.21.127.120 port 35516 ssh2
...
2020-01-06 23:52:15
47.92.204.164 attackspambots
Unauthorized connection attempt detected from IP address 47.92.204.164 to port 167 [T]
2020-01-07 00:16:03
47.96.91.14 attackbots
Unauthorized connection attempt detected from IP address 47.96.91.14 to port 6379 [J]
2020-01-07 00:01:09
87.244.44.218 attackbots
Unauthorized connection attempt detected from IP address 87.244.44.218 to port 22 [T]
2020-01-07 00:12:02
47.92.207.125 attack
Unauthorized connection attempt detected from IP address 47.92.207.125 to port 167 [T]
2020-01-07 00:15:46
39.98.229.49 attackspam
Unauthorized connection attempt detected from IP address 39.98.229.49 to port 167 [T]
2020-01-07 00:25:31
222.244.139.34 attackbotsspam
Unauthorized connection attempt detected from IP address 222.244.139.34 to port 1433 [T]
2020-01-07 00:03:06
112.85.42.180 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
Failed password for root from 112.85.42.180 port 61680 ssh2
Failed password for root from 112.85.42.180 port 61680 ssh2
Failed password for root from 112.85.42.180 port 61680 ssh2
Failed password for root from 112.85.42.180 port 61680 ssh2
2020-01-06 23:50:29
122.178.111.202 attackbots
Unauthorized connection attempt detected from IP address 122.178.111.202 to port 1433 [T]
2020-01-06 23:57:49
89.248.168.112 attack
Unauthorized connection attempt detected from IP address 89.248.168.112 to port 1723 [T]
2020-01-06 23:59:19
39.98.182.86 attack
Unauthorized connection attempt detected from IP address 39.98.182.86 to port 167 [T]
2020-01-07 00:26:41
62.173.151.25 attackspambots
Jan  6 14:12:46 debian-2gb-nbg1-2 kernel: \[575686.576325\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=62.173.151.25 DST=195.201.40.59 LEN=442 TOS=0x00 PREC=0x00 TTL=56 ID=0 DF PROTO=UDP SPT=5087 DPT=5060 LEN=422
2020-01-06 23:47:31
113.141.70.125 attack
01/06/2020-08:12:44.122924 113.141.70.125 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-06 23:52:39
60.13.6.197 attack
Unauthorized connection attempt detected from IP address 60.13.6.197 to port 167 [T]
2020-01-07 00:00:23

Recently Reported IPs

128.116.169.239 128.11.159.93 128.116.136.40 128.116.131.221
128.118.142.114 128.118.142.105 128.127.105.193 128.121.3.154
128.127.106.221 128.127.218.75 128.127.209.118 128.129.41.215
128.128.77.28 128.135.211.104 128.136.110.112 128.136.135.132
128.136.13.157 128.127.11.70 128.136.151.27 128.136.180.191