Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Belize

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.99.216.147 attackbots
138.99.216.147 - - [07/Aug/2020:06:50:18 -0400] "GET /403.shtml HTTP/1.1"
2020-08-07 22:54:31
138.99.216.104 attack
SmallBizIT.US 7 packets to tcp(4444,4455,33333,33890,40000,43389,63389)
2020-08-01 14:07:36
138.99.216.171 attack
Multihost portscan.
2020-07-29 19:35:15
138.99.216.147 attackbotsspam
Unauthorized SSH login attempts
2020-07-26 02:39:10
138.99.216.92 attackspambots
SmallBizIT.US 4 packets to tcp(3380,3384,3386,3390)
2020-07-20 06:26:17
138.99.216.147 attackbotsspam
Hacking
2020-07-04 07:16:06
138.99.216.112 attack
Jun 16 01:36:26 mail postfix/postscreen[14633]: DNSBL rank 3 for [138.99.216.112]:61000
...
2020-06-29 04:47:49
138.99.216.147 attackspam
Jun 20 02:05:08 mail postfix/postscreen[22396]: DNSBL rank 3 for [138.99.216.147]:61000
...
2020-06-29 04:46:26
138.99.216.171 attackbots
Jun 17 01:03:35 mail postfix/postscreen[3929]: DNSBL rank 3 for [138.99.216.171]:61000
...
2020-06-29 04:45:58
138.99.216.112 attackbots
Automatic report - Banned IP Access
2020-06-27 20:39:48
138.99.216.171 attack
bad
2020-06-17 18:35:22
138.99.216.92 attack
SmallBizIT.US 7 packets to tcp(3332,3335,3372,3420,3421,5901,11027)
2020-06-16 07:39:19
138.99.216.92 attack
SmallBizIT.US 3 packets to tcp(3372,3503,55389)
2020-06-06 18:19:38
138.99.216.92 attackbotsspam
port
2020-05-29 16:29:26
138.99.216.147 attackspambots
May 27 06:03:38 mail kernel: [926510.604365] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=138.99.216.147 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=7979 PROTO=TCP SPT=61000 DPT=2525 WINDOW=1024 RES=0x00 SYN URGP=0 
May 27 06:03:47 mail kernel: [926519.228627] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=138.99.216.147 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=52750 PROTO=TCP SPT=61000 DPT=23 WINDOW=1024 RES=0x00 SYN URGP=0 
May 27 06:04:32 mail kernel: [926564.272009] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=138.99.216.147 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=17012 PROTO=TCP SPT=61000 DPT=8095 WINDOW=1024 RES=0x00 SYN URGP=0 
May 27 06:04:40 mail kernel: [926572.880879] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=138.99.216.147 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=34444 PROTO=TCP SPT=61000 DPT=20000 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-27 12:32:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.99.216.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.99.216.18.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:38:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 18.216.99.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.216.99.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.91.11.62 attackbots
Jun  3 15:47:06 abendstille sshd\[5555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.11.62  user=root
Jun  3 15:47:09 abendstille sshd\[5555\]: Failed password for root from 51.91.11.62 port 48274 ssh2
Jun  3 15:50:57 abendstille sshd\[9390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.11.62  user=root
Jun  3 15:50:59 abendstille sshd\[9390\]: Failed password for root from 51.91.11.62 port 54236 ssh2
Jun  3 15:54:52 abendstille sshd\[13505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.11.62  user=root
...
2020-06-03 22:02:40
94.176.189.146 attackspam
SpamScore above: 10.0
2020-06-03 21:42:57
83.233.134.61 attack
2020-06-03T11:55:06.775369Z 4e1d438c7210 New connection: 83.233.134.61:43564 (172.17.0.3:2222) [session: 4e1d438c7210]
2020-06-03T11:55:06.776915Z 2f00d5d9dc28 New connection: 83.233.134.61:43566 (172.17.0.3:2222) [session: 2f00d5d9dc28]
2020-06-03 22:13:27
162.241.65.175 attackspam
Jun  3 20:33:34 itv-usvr-02 sshd[3986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.65.175  user=root
Jun  3 20:37:59 itv-usvr-02 sshd[4110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.65.175  user=root
Jun  3 20:41:19 itv-usvr-02 sshd[4307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.65.175  user=root
2020-06-03 21:54:22
196.1.97.216 attack
Jun  3 12:42:19 sigma sshd\[1702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.97.216  user=rootJun  3 12:55:43 sigma sshd\[1882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.97.216  user=root
...
2020-06-03 21:42:23
180.183.11.116 attackbotsspam
1591185308 - 06/03/2020 13:55:08 Host: 180.183.11.116/180.183.11.116 Port: 445 TCP Blocked
2020-06-03 22:11:47
188.166.60.138 attack
Attempt to log in with non-existing username: admin
2020-06-03 21:47:06
202.107.226.3 attackspambots
*Port Scan* detected from 202.107.226.3 (CN/China/-). 11 hits in the last 250 seconds
2020-06-03 21:55:41
46.32.240.39 attackspambots
Automatic report - XMLRPC Attack
2020-06-03 21:34:37
202.107.226.2 attackbots
Fail2Ban Ban Triggered
2020-06-03 22:07:19
87.251.74.18 attackspambots
Jun  3 15:12:35 [host] kernel: [7818345.984623] [U
Jun  3 15:13:13 [host] kernel: [7818384.056368] [U
Jun  3 15:13:22 [host] kernel: [7818393.310514] [U
Jun  3 15:20:53 [host] kernel: [7818843.774878] [U
Jun  3 15:28:19 [host] kernel: [7819290.108404] [U
Jun  3 15:33:39 [host] kernel: [7819610.146401] [U
2020-06-03 21:46:04
73.229.232.218 attackbots
$f2bV_matches
2020-06-03 21:58:41
45.172.202.9 attackbotsspam
Automatic report - Banned IP Access
2020-06-03 22:01:40
51.254.120.159 attackspambots
Jun  3 14:40:28 PorscheCustomer sshd[6608]: Failed password for root from 51.254.120.159 port 43793 ssh2
Jun  3 14:43:51 PorscheCustomer sshd[6713]: Failed password for root from 51.254.120.159 port 46174 ssh2
...
2020-06-03 21:36:49
195.54.160.210 attackbots
 TCP (SYN) 195.54.160.210:52353 -> port 3356, len 44
2020-06-03 21:51:36

Recently Reported IPs

104.144.3.33 104.194.9.220 107.189.30.230 18.212.138.5
223.72.81.59 43.154.160.97 219.157.255.110 73.205.101.61
180.136.132.251 113.75.31.71 223.222.199.155 124.227.31.121
83.26.171.145 174.86.78.45 72.69.72.68 167.172.176.107
45.191.207.243 200.194.24.51 120.238.95.112 221.14.168.249