Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.119.21.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.119.21.99.			IN	A

;; AUTHORITY SECTION:
.			384	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:59:39 CST 2022
;; MSG SIZE  rcvd: 106
Host info
99.21.119.168.in-addr.arpa domain name pointer web02.wildwestdesign.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.21.119.168.in-addr.arpa	name = web02.wildwestdesign.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.82.123.102 attack
$f2bV_matches
2019-11-02 04:20:48
220.79.135.251 attackbots
23/tcp
[2019-11-01]1pkt
2019-11-02 04:18:54
45.185.216.158 attack
23/tcp
[2019-11-01]1pkt
2019-11-02 04:25:44
79.152.249.134 attackbotsspam
23/tcp
[2019-11-01]1pkt
2019-11-02 04:23:56
201.209.146.104 attackbots
Unauthorized connection attempt from IP address 201.209.146.104 on Port 445(SMB)
2019-11-02 04:21:44
190.14.240.74 attackspam
Nov  1 17:29:42 DAAP sshd[31332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.14.240.74  user=root
Nov  1 17:29:44 DAAP sshd[31332]: Failed password for root from 190.14.240.74 port 53208 ssh2
Nov  1 17:34:03 DAAP sshd[31369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.14.240.74  user=root
Nov  1 17:34:05 DAAP sshd[31369]: Failed password for root from 190.14.240.74 port 35208 ssh2
...
2019-11-02 03:50:22
217.182.253.230 attackspam
Nov  1 19:50:22 *** sshd[10243]: User root from 217.182.253.230 not allowed because not listed in AllowUsers
2019-11-02 04:17:41
45.142.195.5 attackspam
v+mailserver-auth-slow-bruteforce
2019-11-02 04:19:40
80.82.78.100 attackbotsspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-11-02 04:03:07
117.1.64.136 attackbots
Nov  1 21:15:55 mail sshd\[30738\]: Invalid user admin from 117.1.64.136
Nov  1 21:15:55 mail sshd\[30738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.1.64.136
Nov  1 21:15:58 mail sshd\[30738\]: Failed password for invalid user admin from 117.1.64.136 port 35223 ssh2
...
2019-11-02 04:23:28
54.36.172.105 attackspambots
Invalid user usui from 54.36.172.105 port 32786
2019-11-02 03:56:28
45.56.109.203 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/45.56.109.203/ 
 
 US - 1H : (209)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN63949 
 
 IP : 45.56.109.203 
 
 CIDR : 45.56.96.0/20 
 
 PREFIX COUNT : 361 
 
 UNIQUE IP COUNT : 488192 
 
 
 ATTACKS DETECTED ASN63949 :  
  1H - 2 
  3H - 5 
  6H - 5 
 12H - 7 
 24H - 8 
 
 DateTime : 2019-11-01 12:43:48 
 
 INFO :
2019-11-02 04:11:31
103.252.250.107 attackbots
Automatic report - Banned IP Access
2019-11-02 04:29:13
139.155.26.91 attack
Nov  1 14:38:59 server sshd\[1128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.91  user=root
Nov  1 14:39:01 server sshd\[1128\]: Failed password for root from 139.155.26.91 port 41232 ssh2
Nov  1 14:44:15 server sshd\[2282\]: Invalid user fk from 139.155.26.91
Nov  1 14:44:15 server sshd\[2282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.91 
Nov  1 14:44:17 server sshd\[2282\]: Failed password for invalid user fk from 139.155.26.91 port 48216 ssh2
...
2019-11-02 03:52:32
94.232.6.211 attackbots
Chat Spam
2019-11-02 03:51:02

Recently Reported IPs

168.119.211.238 168.119.212.166 168.119.213.142 168.119.212.5
168.119.22.106 168.119.213.143 168.119.228.3 168.119.224.225
168.119.23.187 168.119.235.99 168.119.235.197 168.119.229.146
168.119.24.40 168.119.245.137 168.119.236.160 168.119.244.170
168.119.245.60 168.119.237.60 168.119.242.134 168.119.248.34