Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.5.99.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46474
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.5.99.203.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:09:14 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 203.99.5.137.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 137.5.99.203.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
45.122.238.234 attackspam
Unauthorized connection attempt from IP address 45.122.238.234 on Port 445(SMB)
2020-03-06 03:07:44
103.52.216.136 attackbotsspam
SIP/5060 Probe, BF, Hack -
2020-03-06 03:01:15
106.12.192.129 attackspambots
fail2ban
2020-03-06 02:36:07
3.88.66.153 attack
SSH auth scanning - multiple failed logins
2020-03-06 02:41:45
163.172.63.244 attack
DATE:2020-03-05 19:42:49, IP:163.172.63.244, PORT:ssh SSH brute force auth (docker-dc)
2020-03-06 03:03:47
202.146.241.33 spam
MARRE de ces ORDURES et autres FILS de PUTE genre SOUS MERDES comme ce Théo BOULAIN, joignable au 06.77.32.33.63, capables de POLLUER STUPIDEMENT pour ne pas dire CONNEMENT la Planète par des POURRIELS INUTILES sur des listes VOLÉES on ne sait où et SANS notre accord !

mredwar.rice@yandex.com and mredwardrice@yandex.com to BURN / CLOSE / DELETTE / STOP IMMEDIATELY for SPAM, PHISHING and after SCAM ! ! !

Message-Id: <202003051710.025HADmr032633@smtp1.centrin.net.id>

ALWAYS the same to POLLUTE Word for STUPIDITIES, bette to KILL such donkey !

https://www.mywot.com/scorecard/centrin.net.id

https://en.asytech.cn/check-ip/202.146.241.33
2020-03-06 02:52:29
118.171.108.224 attack
Unauthorized connection attempt from IP address 118.171.108.224 on Port 445(SMB)
2020-03-06 02:47:20
163.172.57.247 attack
Feb 14 01:20:26 odroid64 sshd\[4913\]: User root from 163.172.57.247 not allowed because not listed in AllowUsers
Feb 14 01:20:26 odroid64 sshd\[4913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.57.247  user=root
...
2020-03-06 03:05:43
164.132.42.32 attack
Jan 15 08:43:19 odroid64 sshd\[15741\]: Invalid user humberto from 164.132.42.32
Jan 15 08:43:19 odroid64 sshd\[15741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.42.32
...
2020-03-06 02:30:03
62.210.90.227 attackbotsspam
Mar  1 01:05:52 odroid64 sshd\[27394\]: Invalid user minecraft from 62.210.90.227
Mar  1 01:05:52 odroid64 sshd\[27394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.90.227
...
2020-03-06 03:01:33
138.197.154.203 attack
GET /muieblackcat HTTP/1.1 
       GET //phpmyadmin/scripts/setup.php HTTP/1.1 
       GET //MyAdmin/scripts/setup.php HTTP/1.1 
       GET //phpMyAdmin/scripts/setup.php HTTP/1.1 
       GET //myadmin/scripts/setup.php HTTP/1.1 
       GET //pma/scripts/setup.php HTTP/1.1
2020-03-06 02:51:16
103.95.221.232 attackbotsspam
SIP/5060 Probe, BF, Hack -
2020-03-06 03:06:47
109.110.52.77 attackspam
Mar  5 18:19:00 localhost sshd[25958]: Invalid user alotrolado2001 from 109.110.52.77 port 56280
Mar  5 18:19:00 localhost sshd[25958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.110.52.77
Mar  5 18:19:00 localhost sshd[25958]: Invalid user alotrolado2001 from 109.110.52.77 port 56280
Mar  5 18:19:02 localhost sshd[25958]: Failed password for invalid user alotrolado2001 from 109.110.52.77 port 56280 ssh2
Mar  5 18:22:51 localhost sshd[26388]: Invalid user ftpuser from 109.110.52.77 port 54050
...
2020-03-06 02:50:15
111.229.39.187 attack
Invalid user d from 111.229.39.187 port 37994
2020-03-06 02:42:52
103.45.147.157 attack
Mar  5 19:20:14 debian-2gb-nbg1-2 kernel: \[5691583.257384\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.45.147.157 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=41244 PROTO=TCP SPT=42445 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-06 02:57:09

Recently Reported IPs

120.232.20.11 155.205.46.224 175.206.241.146 109.61.116.190
166.229.105.190 130.10.188.1 34.172.91.105 36.23.146.165
50.133.24.11 161.180.239.225 50.9.58.16 145.183.175.69
244.136.89.85 143.126.119.12 7.74.7.219 132.14.4.117
71.203.157.84 84.254.161.219 198.101.144.46 146.226.204.130