Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.99.45.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13918
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.99.45.217.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:45:23 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 217.45.99.136.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 136.99.45.217.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.212 attackbots
2020-02-17T21:38:33.293261vps751288.ovh.net sshd\[6788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
2020-02-17T21:38:35.266270vps751288.ovh.net sshd\[6788\]: Failed password for root from 218.92.0.212 port 34377 ssh2
2020-02-17T21:38:38.859925vps751288.ovh.net sshd\[6788\]: Failed password for root from 218.92.0.212 port 34377 ssh2
2020-02-17T21:38:42.669514vps751288.ovh.net sshd\[6788\]: Failed password for root from 218.92.0.212 port 34377 ssh2
2020-02-17T21:38:45.891040vps751288.ovh.net sshd\[6788\]: Failed password for root from 218.92.0.212 port 34377 ssh2
2020-02-18 04:57:33
114.198.172.103 attackbotsspam
Port probing on unauthorized port 23
2020-02-18 04:25:52
1.54.204.222 attackbots
Unauthorized connection attempt detected from IP address 1.54.204.222 to port 445
2020-02-18 04:40:37
168.197.31.13 attack
Invalid user rakesh from 168.197.31.13 port 46656
2020-02-18 04:56:33
213.241.63.42 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 04:45:00
59.57.13.176 attack
Feb 17 23:10:35 server sshd\[16258\]: Invalid user fabian from 59.57.13.176
Feb 17 23:10:35 server sshd\[16258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.57.13.176 
Feb 17 23:10:37 server sshd\[16258\]: Failed password for invalid user fabian from 59.57.13.176 port 45954 ssh2
Feb 17 23:24:51 server sshd\[19095\]: Invalid user clio from 59.57.13.176
Feb 17 23:24:51 server sshd\[19095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.57.13.176 
...
2020-02-18 04:49:00
181.65.181.115 attack
Invalid user daniel from 181.65.181.115 port 39868
2020-02-18 04:34:42
177.11.58.241 attackspambots
Automatic report - Port Scan Attack
2020-02-18 04:54:29
71.95.243.20 attackbotsspam
Feb 17 18:22:17 server sshd\[26399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71-95-243-20.dhcp.rvsd.ca.charter.com  user=root
Feb 17 18:22:19 server sshd\[26399\]: Failed password for root from 71.95.243.20 port 34882 ssh2
Feb 17 18:46:58 server sshd\[30827\]: Invalid user service from 71.95.243.20
Feb 17 18:46:58 server sshd\[30827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71-95-243-20.dhcp.rvsd.ca.charter.com 
Feb 17 18:47:00 server sshd\[30827\]: Failed password for invalid user service from 71.95.243.20 port 58460 ssh2
...
2020-02-18 04:51:41
213.248.132.228 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 04:43:10
117.174.24.190 attack
[portscan] Port scan
2020-02-18 04:49:55
85.93.20.62 attack
Port probing on unauthorized port 3395
2020-02-18 04:35:38
103.81.84.10 attackbotsspam
Feb 17 11:35:00 firewall sshd[2750]: Invalid user hong from 103.81.84.10
Feb 17 11:35:02 firewall sshd[2750]: Failed password for invalid user hong from 103.81.84.10 port 54470 ssh2
Feb 17 11:38:45 firewall sshd[2918]: Invalid user hyperic from 103.81.84.10
...
2020-02-18 05:00:49
185.175.93.104 attack
Zimbra Scan
2020-02-18 04:49:37
165.227.93.39 attackbotsspam
SSH login attempts.
2020-02-18 05:05:07

Recently Reported IPs

71.200.143.76 130.44.184.213 31.224.192.254 49.130.254.50
83.191.36.28 223.77.108.233 209.93.130.56 109.254.176.171
137.155.251.129 220.115.31.24 45.172.64.94 18.238.147.127
190.12.223.15 39.188.210.160 209.173.184.197 5.252.67.170
29.59.141.96 248.69.35.208 238.1.253.5 210.154.93.84