Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 167.42.196.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;167.42.196.99.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031102 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 12 11:43:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 99.196.42.167.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.196.42.167.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.211.51.65 attackspambots
Jun  5 22:22:10 ns382633 sshd\[27709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.51.65  user=root
Jun  5 22:22:12 ns382633 sshd\[27709\]: Failed password for root from 129.211.51.65 port 61698 ssh2
Jun  5 22:25:34 ns382633 sshd\[28428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.51.65  user=root
Jun  5 22:25:36 ns382633 sshd\[28428\]: Failed password for root from 129.211.51.65 port 41807 ssh2
Jun  5 22:27:02 ns382633 sshd\[28605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.51.65  user=root
2020-06-06 06:03:26
91.121.175.138 attackspam
Jun  5 22:10:18 roki-contabo sshd\[8775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.175.138  user=root
Jun  5 22:10:20 roki-contabo sshd\[8775\]: Failed password for root from 91.121.175.138 port 60810 ssh2
Jun  5 22:24:44 roki-contabo sshd\[8968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.175.138  user=root
Jun  5 22:24:46 roki-contabo sshd\[8968\]: Failed password for root from 91.121.175.138 port 39922 ssh2
Jun  5 22:27:35 roki-contabo sshd\[9006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.175.138  user=root
...
2020-06-06 05:47:03
198.143.158.86 attackbotsspam
Honeypot attack, port: 445, PTR: sh-phx-us-gp1-wk109.internet-census.org.
2020-06-06 05:37:32
12.35.13.130 attackspambots
20/6/5@16:27:46: FAIL: Alarm-Network address from=12.35.13.130
...
2020-06-06 05:38:54
106.12.197.165 attackbotsspam
$f2bV_matches
2020-06-06 05:42:12
51.91.248.152 attackspam
$f2bV_matches
2020-06-06 05:32:32
188.165.236.122 attackbots
Jun  5 21:18:27 web8 sshd\[31739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.236.122  user=root
Jun  5 21:18:29 web8 sshd\[31739\]: Failed password for root from 188.165.236.122 port 47195 ssh2
Jun  5 21:21:42 web8 sshd\[928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.236.122  user=root
Jun  5 21:21:44 web8 sshd\[928\]: Failed password for root from 188.165.236.122 port 50735 ssh2
Jun  5 21:24:59 web8 sshd\[2915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.236.122  user=root
2020-06-06 05:26:19
138.197.197.95 attackbotsspam
138.197.197.95 - - [05/Jun/2020:22:27:44 +0200] "GET /wp-login.php HTTP/1.1" 200 6433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.197.95 - - [05/Jun/2020:22:27:46 +0200] "POST /wp-login.php HTTP/1.1" 200 6684 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.197.95 - - [05/Jun/2020:22:27:48 +0200] "GET /wp-login.php HTTP/1.1" 200 6433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-06 05:34:59
222.186.31.83 attackbots
Jun  5 23:44:02 legacy sshd[9236]: Failed password for root from 222.186.31.83 port 55738 ssh2
Jun  5 23:44:10 legacy sshd[9240]: Failed password for root from 222.186.31.83 port 44818 ssh2
...
2020-06-06 05:44:24
37.131.22.130 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-06 05:31:25
220.134.28.166 attackbots
Lines containing failures of 220.134.28.166
Jun  4 14:21:31 nexus sshd[28377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.28.166  user=r.r
Jun  4 14:21:33 nexus sshd[28377]: Failed password for r.r from 220.134.28.166 port 43758 ssh2
Jun  4 14:21:34 nexus sshd[28377]: Received disconnect from 220.134.28.166 port 43758:11: Bye Bye [preauth]
Jun  4 14:21:34 nexus sshd[28377]: Disconnected from 220.134.28.166 port 43758 [preauth]
Jun  4 14:38:00 nexus sshd[29051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.28.166  user=r.r
Jun  4 14:38:02 nexus sshd[29051]: Failed password for r.r from 220.134.28.166 port 37306 ssh2
Jun  4 14:38:03 nexus sshd[29051]: Received disconnect from 220.134.28.166 port 37306:11: Bye Bye [preauth]
Jun  4 14:38:03 nexus sshd[29051]: Disconnected from 220.134.28.166 port 37306 [preauth]
Jun  4 14:42:03 nexus sshd[29118]: pam_unix(sshd:auth): authe........
------------------------------
2020-06-06 05:56:02
37.187.181.182 attack
Jun  5 11:23:52 auw2 sshd\[17514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.ip-37-187-181.eu  user=root
Jun  5 11:23:54 auw2 sshd\[17514\]: Failed password for root from 37.187.181.182 port 58594 ssh2
Jun  5 11:26:57 auw2 sshd\[17784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.ip-37-187-181.eu  user=root
Jun  5 11:26:59 auw2 sshd\[17784\]: Failed password for root from 37.187.181.182 port 33224 ssh2
Jun  5 11:30:10 auw2 sshd\[18021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.ip-37-187-181.eu  user=root
2020-06-06 05:32:58
222.186.15.158 attackbotsspam
06/05/2020-17:28:22.441109 222.186.15.158 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-06 05:29:45
81.182.254.124 attack
Jun  5 11:25:13 php1 sshd\[27618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.182.254.124  user=root
Jun  5 11:25:16 php1 sshd\[27618\]: Failed password for root from 81.182.254.124 port 36038 ssh2
Jun  5 11:28:56 php1 sshd\[27876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.182.254.124  user=root
Jun  5 11:28:58 php1 sshd\[27876\]: Failed password for root from 81.182.254.124 port 39898 ssh2
Jun  5 11:32:45 php1 sshd\[28172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.182.254.124  user=root
2020-06-06 05:45:38
109.177.119.41 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-06 05:59:36

Recently Reported IPs

189.11.32.99 64.114.216.76 80.164.51.189 218.37.183.42
188.130.222.9 90.249.201.31 130.10.167.125 60.86.229.230
218.239.12.134 131.208.109.43 126.233.214.233 75.232.81.254
40.24.131.17 78.47.146.62 229.123.191.185 194.96.166.176
7.71.181.53 151.174.245.159 112.215.151.167 88.48.85.77