Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
198.20.99.130 attackspambots
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 9300 [T]
2020-08-31 17:01:37
198.20.99.130 attackspam
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 1830 [T]
2020-08-29 20:34:43
198.20.99.130 attack
scans 2 times in preceeding hours on the ports (in chronological order) 8411 9034
2020-08-26 23:51:38
198.20.99.130 attackspambots
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 5190
2020-08-07 14:32:10
198.20.99.130 attackbots
 TCP (SYN) 198.20.99.130:26200 -> port 6003, len 44
2020-08-02 01:13:56
198.20.99.130 attackbotsspam
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 3554
2020-07-22 01:25:50
198.20.99.130 attackspam
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 8024
2020-07-14 01:36:15
198.20.99.130 attackbotsspam
Port scanning [2 denied]
2020-07-13 14:55:35
198.20.99.130 attackbots
 TCP (SYN) 198.20.99.130:26200 -> port 8874, len 44
2020-06-27 17:33:04
198.20.99.130 attack
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 3400 [T]
2020-06-24 03:27:14
198.20.99.130 attack
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 3103 [T]
2020-06-21 00:33:45
198.20.99.130 attackspambots
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 3118
2020-06-02 05:44:30
198.20.99.130 attackbots
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 8869
2020-06-01 00:30:49
198.20.99.130 attack
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 8406
2020-05-09 04:33:17
198.20.99.130 attackbotsspam
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 5400
2020-05-07 01:43:37
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.20.99.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.20.99.135.			IN	A

;; AUTHORITY SECTION:
.			248	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061000 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 11 01:09:23 CST 2022
;; MSG SIZE  rcvd: 106
Host info
135.99.20.198.in-addr.arpa domain name pointer census4.shodan.io.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.99.20.198.in-addr.arpa	name = census4.shodan.io.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.63.169.33 attackbots
2019-11-05T04:54:59.296358abusebot-6.cloudsearch.cf sshd\[20742\]: Invalid user Eemil from 14.63.169.33 port 41352
2019-11-05 13:04:35
190.58.106.126 attackspambots
Automatic report - Port Scan Attack
2019-11-05 13:40:11
46.166.151.47 attack
\[2019-11-05 00:05:26\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-05T00:05:26.298-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00146462607509",SessionID="0x7fdf2c49a4d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/61090",ACLName="no_extension_match"
\[2019-11-05 00:08:43\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-05T00:08:43.793-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00246462607509",SessionID="0x7fdf2c329288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/54863",ACLName="no_extension_match"
\[2019-11-05 00:12:44\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-05T00:12:44.391-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="80046462607509",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/55029",ACLName="no_extens
2019-11-05 13:37:12
42.200.156.22 attackbots
2019-11-05T05:07:19.964249shield sshd\[19125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-156-22.static.imsbiz.com  user=root
2019-11-05T05:07:21.703000shield sshd\[19125\]: Failed password for root from 42.200.156.22 port 37378 ssh2
2019-11-05T05:11:49.074708shield sshd\[19762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-156-22.static.imsbiz.com  user=root
2019-11-05T05:11:50.873158shield sshd\[19762\]: Failed password for root from 42.200.156.22 port 49024 ssh2
2019-11-05T05:16:15.913961shield sshd\[20703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-156-22.static.imsbiz.com  user=root
2019-11-05 13:30:57
54.36.214.76 attackbots
2019-11-05T06:19:28.125595mail01 postfix/smtpd[23107]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-05T06:20:02.330572mail01 postfix/smtpd[23151]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-05T06:20:47.163381mail01 postfix/smtpd[23151]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-05T06:20:47.163817mail01 postfix/smtpd[23107]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-05 13:36:55
184.66.225.102 attack
Nov  4 18:47:39 sachi sshd\[6516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010640b076c08b50.gv.shawcable.net  user=root
Nov  4 18:47:41 sachi sshd\[6516\]: Failed password for root from 184.66.225.102 port 51328 ssh2
Nov  4 18:51:18 sachi sshd\[6790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010640b076c08b50.gv.shawcable.net  user=root
Nov  4 18:51:21 sachi sshd\[6790\]: Failed password for root from 184.66.225.102 port 33422 ssh2
Nov  4 18:55:02 sachi sshd\[7093\]: Invalid user dibarra from 184.66.225.102
Nov  4 18:55:02 sachi sshd\[7093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010640b076c08b50.gv.shawcable.net
2019-11-05 13:02:42
175.207.219.185 attackbots
no
2019-11-05 13:39:51
106.51.2.108 attackspambots
Nov  5 06:30:38 dedicated sshd[25522]: Invalid user jesenice from 106.51.2.108 port 54337
Nov  5 06:30:38 dedicated sshd[25522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.2.108 
Nov  5 06:30:38 dedicated sshd[25522]: Invalid user jesenice from 106.51.2.108 port 54337
Nov  5 06:30:40 dedicated sshd[25522]: Failed password for invalid user jesenice from 106.51.2.108 port 54337 ssh2
Nov  5 06:34:48 dedicated sshd[26185]: Invalid user zxin11 from 106.51.2.108 port 12033
2019-11-05 13:36:21
159.203.193.246 attack
" "
2019-11-05 13:20:32
187.16.96.35 attackspambots
Nov  4 19:08:07 auw2 sshd\[19972\]: Invalid user lukasz from 187.16.96.35
Nov  4 19:08:07 auw2 sshd\[19972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-187-16-96-35.mundivox.com
Nov  4 19:08:09 auw2 sshd\[19972\]: Failed password for invalid user lukasz from 187.16.96.35 port 54776 ssh2
Nov  4 19:12:44 auw2 sshd\[20502\]: Invalid user klx from 187.16.96.35
Nov  4 19:12:44 auw2 sshd\[20502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-187-16-96-35.mundivox.com
2019-11-05 13:20:14
185.139.48.130 attackspam
Automatic report - Banned IP Access
2019-11-05 13:42:58
109.107.235.224 attackspambots
Automatic report - Port Scan Attack
2019-11-05 13:14:07
115.28.28.62 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-05 13:44:12
164.163.28.194 attackbotsspam
" "
2019-11-05 13:19:41
18.216.54.50 attackspam
18.216.54.50 was recorded 5 times by 1 hosts attempting to connect to the following ports: 6379,6380. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-05 13:22:48

Recently Reported IPs

121.132.178.145 103.100.84.21 137.226.0.17 209.141.60.126
95.217.7.105 43.154.61.143 20.29.49.207 1.173.164.246
171.246.1.203 198.20.69.79 90.179.72.79 23.128.248.92
198.20.69.77 193.230.142.221 66.206.35.238 211.21.113.128
111.77.59.228 37.252.255.135 198.20.99.129 43.154.135.237