Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Akron

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.99.219.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15564
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.99.219.199.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091500 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 16 01:39:50 CST 2019
;; MSG SIZE  rcvd: 118
Host info
199.219.99.140.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 199.219.99.140.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
59.102.143.246 attack
Autoban   59.102.143.246 AUTH/CONNECT
2019-12-13 02:53:17
58.140.211.56 attackbotsspam
Autoban   58.140.211.56 AUTH/CONNECT
2019-12-13 03:02:16
61.78.203.45 attack
Autoban   61.78.203.45 AUTH/CONNECT
2019-12-13 02:34:49
59.25.203.65 attackspam
Autoban   59.25.203.65 AUTH/CONNECT
2019-12-13 02:49:37
217.29.21.66 attackbotsspam
2019-12-12T19:31:09.774463  sshd[2800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.29.21.66  user=root
2019-12-12T19:31:11.605189  sshd[2800]: Failed password for root from 217.29.21.66 port 38467 ssh2
2019-12-12T19:40:58.251854  sshd[2966]: Invalid user ftp01 from 217.29.21.66 port 35211
2019-12-12T19:40:58.266600  sshd[2966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.29.21.66
2019-12-12T19:40:58.251854  sshd[2966]: Invalid user ftp01 from 217.29.21.66 port 35211
2019-12-12T19:41:00.292686  sshd[2966]: Failed password for invalid user ftp01 from 217.29.21.66 port 35211 ssh2
...
2019-12-13 02:53:43
106.75.178.195 attackbots
Dec 12 18:09:13 sauna sshd[233584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.178.195
Dec 12 18:09:15 sauna sshd[233584]: Failed password for invalid user ssh from 106.75.178.195 port 47460 ssh2
...
2019-12-13 02:34:25
23.32.38.53 attack
abuse@akamai.com is not effective! 46 hack attacks in 24 hours...
[DoS attack: FIN Scan] (1) attack packets 

repetitive abusive IP since Oct 2019:
104.118.9.53
104.70.184.50
104.76.105.242
104.77.9.119
104.77.9.242
104.77.9.53
104.96.170.145
23.205.152.152
23.32.38.117
23.32.38.53
23.32.39.103
23.33.189.55
23.36.36.53
23.78.208.56
96.6.22.62
2019-12-13 02:33:00
14.29.162.139 attackspambots
Dec 12 16:26:03 DAAP sshd[23292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139  user=games
Dec 12 16:26:06 DAAP sshd[23292]: Failed password for games from 14.29.162.139 port 13458 ssh2
Dec 12 16:34:26 DAAP sshd[23383]: Invalid user tbdb from 14.29.162.139 port 18317
...
2019-12-13 03:01:23
59.15.234.78 attackbots
Autoban   59.15.234.78 AUTH/CONNECT
2019-12-13 02:51:41
59.153.84.253 attackspam
Autoban   59.153.84.253 AUTH/CONNECT
2019-12-13 02:50:09
58.186.114.32 attackspam
Autoban   58.186.114.32 AUTH/CONNECT
2019-12-13 03:00:28
59.148.42.146 attackspam
Autoban   59.148.42.146 AUTH/CONNECT
2019-12-13 02:51:24
61.69.177.139 attackbotsspam
Autoban   61.69.177.139 AUTH/CONNECT
2019-12-13 02:36:35
59.41.164.217 attackbotsspam
Autoban   59.41.164.217 AUTH/CONNECT
2019-12-13 02:48:13
61.32.154.211 attackspambots
Autoban   61.32.154.211 AUTH/CONNECT
2019-12-13 02:38:23

Recently Reported IPs

42.93.66.120 46.88.50.193 1.136.85.238 36.70.236.163
218.19.77.93 192.106.61.183 139.57.255.81 151.21.161.146
64.66.98.182 208.34.158.183 63.25.184.156 173.6.242.15
13.48.134.231 78.173.25.84 150.226.219.153 60.231.77.106
84.75.43.7 153.0.213.25 50.78.156.80 200.62.231.229