Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.113.199.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22245
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.113.199.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 14:29:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 6.199.113.199.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 199.113.199.6.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
40.68.208.132 attackspambots
RDP Bruteforce
2019-11-16 01:53:49
222.186.180.41 attack
2019-11-15T18:28:18.041164scmdmz1 sshd\[8877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2019-11-15T18:28:20.037207scmdmz1 sshd\[8877\]: Failed password for root from 222.186.180.41 port 21312 ssh2
2019-11-15T18:28:23.001703scmdmz1 sshd\[8877\]: Failed password for root from 222.186.180.41 port 21312 ssh2
...
2019-11-16 01:32:15
73.189.112.132 attack
2019-11-15T12:09:33.5867131495-001 sshd\[19944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-189-112-132.hsd1.ca.comcast.net  user=root
2019-11-15T12:09:35.5060791495-001 sshd\[19944\]: Failed password for root from 73.189.112.132 port 34430 ssh2
2019-11-15T12:19:41.0590241495-001 sshd\[20277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-189-112-132.hsd1.ca.comcast.net  user=root
2019-11-15T12:19:43.0809461495-001 sshd\[20277\]: Failed password for root from 73.189.112.132 port 55814 ssh2
2019-11-15T12:25:59.1545741495-001 sshd\[20534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-189-112-132.hsd1.ca.comcast.net  user=root
2019-11-15T12:26:00.7342611495-001 sshd\[20534\]: Failed password for root from 73.189.112.132 port 36588 ssh2
...
2019-11-16 01:44:37
111.230.105.196 attackspam
Nov 15 13:50:40 firewall sshd[26158]: Invalid user neghin from 111.230.105.196
Nov 15 13:50:42 firewall sshd[26158]: Failed password for invalid user neghin from 111.230.105.196 port 44076 ssh2
Nov 15 13:56:54 firewall sshd[26286]: Invalid user operator from 111.230.105.196
...
2019-11-16 01:20:40
81.22.45.115 attackbots
2019-11-15T18:16:17.182909+01:00 lumpi kernel: [3660550.328683] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.115 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=46411 PROTO=TCP SPT=40293 DPT=954 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-16 01:18:36
111.164.177.51 attackspambots
Nov 15 13:57:50 firewall sshd[26305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.164.177.51
Nov 15 13:57:50 firewall sshd[26305]: Invalid user pi from 111.164.177.51
Nov 15 13:57:52 firewall sshd[26305]: Failed password for invalid user pi from 111.164.177.51 port 59718 ssh2
...
2019-11-16 01:43:19
180.168.76.222 attackbots
Tried sshing with brute force.
2019-11-16 01:27:59
83.102.134.71 attackspam
Nov 15 14:42:49 marvibiene sshd[49729]: Invalid user admin from 83.102.134.71 port 4347
Nov 15 14:42:50 marvibiene sshd[49729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.102.134.71
Nov 15 14:42:49 marvibiene sshd[49729]: Invalid user admin from 83.102.134.71 port 4347
Nov 15 14:42:52 marvibiene sshd[49729]: Failed password for invalid user admin from 83.102.134.71 port 4347 ssh2
...
2019-11-16 01:31:43
103.206.131.243 attackbots
Nov 15 16:53:07 microserver sshd[4126]: Invalid user cardgood from 103.206.131.243 port 60954
Nov 15 16:53:07 microserver sshd[4126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.206.131.243
Nov 15 16:53:08 microserver sshd[4126]: Failed password for invalid user cardgood from 103.206.131.243 port 60954 ssh2
Nov 15 16:57:35 microserver sshd[4771]: Invalid user battle from 103.206.131.243 port 41840
Nov 15 16:57:35 microserver sshd[4771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.206.131.243
Nov 15 17:10:28 microserver sshd[6714]: Invalid user milonia from 103.206.131.243 port 40962
Nov 15 17:10:28 microserver sshd[6714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.206.131.243
Nov 15 17:10:31 microserver sshd[6714]: Failed password for invalid user milonia from 103.206.131.243 port 40962 ssh2
Nov 15 17:14:50 microserver sshd[6973]: Invalid user justin from 103.206.131
2019-11-16 01:42:20
104.244.75.179 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 01:21:06
222.252.94.108 attackbotsspam
Brute force attempt
2019-11-16 01:48:33
104.255.199.18 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 01:11:33
89.233.219.180 attack
Unauthorised access (Nov 15) SRC=89.233.219.180 LEN=40 TTL=56 ID=47135 TCP DPT=23 WINDOW=47969 SYN
2019-11-16 01:41:31
45.55.177.170 attackspambots
Tried sshing with brute force.
2019-11-16 01:28:28
5.140.164.241 attack
Automatic report - Banned IP Access
2019-11-16 01:50:23

Recently Reported IPs

15.143.191.184 79.73.255.100 249.19.200.21 219.136.66.86
129.175.70.146 107.206.212.241 170.196.111.140 176.208.164.156
157.13.27.151 188.163.59.224 203.209.58.203 41.166.22.188
178.174.80.42 56.147.33.245 93.26.43.103 132.253.203.176
203.96.250.113 45.221.78.128 201.243.246.43 135.37.139.233