Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.252.99.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50630
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.252.99.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 02:27:00 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 169.99.252.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.99.252.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.130.250.229 attack
Invalid user admin from 125.130.250.229 port 46994
2020-04-19 03:07:37
111.229.211.5 attack
$f2bV_matches
2020-04-19 02:40:57
51.159.35.94 attackspam
SSH brutforce
2020-04-19 03:21:22
51.178.51.152 attackspam
2020-04-18T14:06:49.752665abusebot-4.cloudsearch.cf sshd[17330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.ip-51-178-51.eu  user=root
2020-04-18T14:06:52.164292abusebot-4.cloudsearch.cf sshd[17330]: Failed password for root from 51.178.51.152 port 42858 ssh2
2020-04-18T14:11:53.401480abusebot-4.cloudsearch.cf sshd[17826]: Invalid user qe from 51.178.51.152 port 33462
2020-04-18T14:11:53.409335abusebot-4.cloudsearch.cf sshd[17826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.ip-51-178-51.eu
2020-04-18T14:11:53.401480abusebot-4.cloudsearch.cf sshd[17826]: Invalid user qe from 51.178.51.152 port 33462
2020-04-18T14:11:55.219263abusebot-4.cloudsearch.cf sshd[17826]: Failed password for invalid user qe from 51.178.51.152 port 33462 ssh2
2020-04-18T14:16:49.883653abusebot-4.cloudsearch.cf sshd[18261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.ip-
...
2020-04-19 03:21:05
51.77.212.235 attackspam
Invalid user admin from 51.77.212.235 port 44456
2020-04-19 03:21:46
14.186.238.216 attackbotsspam
Invalid user admin from 14.186.238.216 port 53815
2020-04-19 02:53:13
106.54.64.136 attackspambots
Apr 18 14:45:21 server sshd[8253]: Failed password for root from 106.54.64.136 port 46728 ssh2
Apr 18 14:59:57 server sshd[21199]: Failed password for root from 106.54.64.136 port 47208 ssh2
Apr 18 15:04:19 server sshd[25042]: Failed password for invalid user admin from 106.54.64.136 port 35068 ssh2
2020-04-19 02:42:43
95.27.154.174 attack
Invalid user admin from 95.27.154.174 port 58720
2020-04-19 03:18:24
113.173.157.130 attack
Invalid user admin from 113.173.157.130 port 35625
2020-04-19 03:11:54
187.189.226.22 attackbotsspam
Invalid user admin from 187.189.226.22 port 58315
2020-04-19 02:58:14
113.173.185.98 attackspam
Invalid user admin from 113.173.185.98 port 48638
2020-04-19 03:11:35
51.68.190.214 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-19 02:49:54
156.213.151.9 attackbotsspam
Invalid user admin from 156.213.151.9 port 54921
2020-04-19 03:04:10
111.220.110.188 attackspambots
Apr 18 13:45:15 vlre-nyc-1 sshd\[25848\]: Invalid user ubuntu from 111.220.110.188
Apr 18 13:45:15 vlre-nyc-1 sshd\[25848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.220.110.188
Apr 18 13:45:17 vlre-nyc-1 sshd\[25848\]: Failed password for invalid user ubuntu from 111.220.110.188 port 40732 ssh2
Apr 18 13:50:29 vlre-nyc-1 sshd\[25964\]: Invalid user wz from 111.220.110.188
Apr 18 13:50:29 vlre-nyc-1 sshd\[25964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.220.110.188
...
2020-04-19 02:41:50
14.186.23.241 attack
Invalid user admin from 14.186.23.241 port 43664
2020-04-19 02:53:56

Recently Reported IPs

132.95.80.5 98.216.223.183 204.216.61.152 143.125.29.35
73.231.190.125 69.137.75.69 62.98.30.222 101.138.124.187
221.36.130.30 45.121.208.195 73.255.139.236 95.182.3.0
91.92.79.43 189.24.120.210 30.110.71.85 117.164.49.164
199.84.15.254 250.33.100.183 140.83.79.19 28.138.160.245