Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Grua

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.112.99.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10611
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.112.99.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:02:35 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 98.99.112.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 98.99.112.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.154.59.241 attackbotsspam
Unauthorised access (Jul 20) SRC=203.154.59.241 LEN=60 PREC=0x20 TTL=46 ID=11051 DF TCP DPT=1433 WINDOW=29200 SYN
2019-07-21 05:33:19
5.200.71.174 attackspambots
Automatic report - Port Scan Attack
2019-07-21 05:28:09
120.29.77.86 attackspambots
Malicious/Probing: /xmlrpc.php
2019-07-21 05:18:34
111.249.131.42 attack
Unauthorized connection attempt from IP address 111.249.131.42 on Port 445(SMB)
2019-07-21 05:22:25
111.73.46.15 attack
firewall-block, port(s): 3306/tcp
2019-07-21 05:19:09
189.103.79.87 attack
Jul 20 15:43:04 lnxmysql61 sshd[14094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.103.79.87
2019-07-21 05:07:27
162.247.74.200 attackspam
Jul 20 21:42:37 apollo sshd\[10645\]: Failed password for root from 162.247.74.200 port 60438 ssh2Jul 20 21:42:40 apollo sshd\[10645\]: Failed password for root from 162.247.74.200 port 60438 ssh2Jul 20 21:42:42 apollo sshd\[10645\]: Failed password for root from 162.247.74.200 port 60438 ssh2
...
2019-07-21 05:35:22
115.68.45.166 attackspambots
19/7/20@07:31:40: FAIL: Alarm-Intrusion address from=115.68.45.166
...
2019-07-21 05:22:59
125.212.247.15 attackbotsspam
Jul 20 23:18:42 localhost sshd\[7312\]: Invalid user oracle from 125.212.247.15 port 46101
Jul 20 23:18:43 localhost sshd\[7312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.247.15
Jul 20 23:18:45 localhost sshd\[7312\]: Failed password for invalid user oracle from 125.212.247.15 port 46101 ssh2
2019-07-21 05:44:32
201.46.59.171 attackspambots
failed_logins
2019-07-21 05:37:48
116.106.30.113 attackspambots
Unauthorized connection attempt from IP address 116.106.30.113 on Port 445(SMB)
2019-07-21 05:30:00
185.82.244.204 attack
Unauthorized connection attempt from IP address 185.82.244.204 on Port 445(SMB)
2019-07-21 05:34:50
1.6.123.91 attack
Unauthorized connection attempt from IP address 1.6.123.91 on Port 445(SMB)
2019-07-21 05:40:00
121.42.52.27 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-21 05:16:06
45.55.199.123 attackbots
10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined
node-superagent/4.1.0
2019-07-21 05:11:32

Recently Reported IPs

79.135.62.202 199.244.198.5 210.33.246.248 207.103.187.52
185.176.145.75 194.71.93.153 37.121.239.169 215.181.227.53
64.29.228.184 161.7.115.94 147.77.100.204 144.200.231.54
37.36.64.146 124.24.225.60 37.242.130.203 138.65.118.201
230.73.20.56 185.29.34.219 67.101.140.113 221.117.102.78