Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.244.112.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.244.112.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 15:09:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 99.112.244.208.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.112.244.208.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.161.227.20 attack
445/tcp 445/tcp
[2020-08-16/29]2pkt
2020-08-29 16:02:52
203.160.173.82 attack
Unauthorized connection attempt from IP address 203.160.173.82 on Port 445(SMB)
2020-08-29 15:58:22
222.186.173.201 attack
DATE:2020-08-29 09:38:26,IP:222.186.173.201,MATCHES:10,PORT:ssh
2020-08-29 15:39:58
27.72.126.19 attack
445/tcp 445/tcp 445/tcp...
[2020-07-05/08-29]4pkt,1pt.(tcp)
2020-08-29 16:04:30
27.71.89.34 attackbots
Unauthorized connection attempt from IP address 27.71.89.34 on Port 445(SMB)
2020-08-29 16:10:56
175.24.67.217 attackspam
Invalid user elastic from 175.24.67.217 port 36136
2020-08-29 15:45:19
51.145.242.1 attackspam
*Port Scan* detected from 51.145.242.1 (NL/Netherlands/North Holland/Amsterdam/-). 4 hits in the last 240 seconds
2020-08-29 16:18:49
113.53.75.25 attack
Port Scan
...
2020-08-29 15:51:23
106.54.20.184 attack
Aug 29 09:30:17 pkdns2 sshd\[19981\]: Failed password for root from 106.54.20.184 port 56698 ssh2Aug 29 09:31:28 pkdns2 sshd\[20014\]: Failed password for root from 106.54.20.184 port 39656 ssh2Aug 29 09:32:34 pkdns2 sshd\[20059\]: Invalid user test from 106.54.20.184Aug 29 09:32:36 pkdns2 sshd\[20059\]: Failed password for invalid user test from 106.54.20.184 port 50840 ssh2Aug 29 09:33:44 pkdns2 sshd\[20108\]: Failed password for root from 106.54.20.184 port 33798 ssh2Aug 29 09:34:55 pkdns2 sshd\[20148\]: Invalid user applvis from 106.54.20.184
...
2020-08-29 15:59:09
1.52.162.144 attackspam
Aug 29 05:56:05 karger wordpress(buerg)[7840]: XML-RPC authentication attempt for unknown user domi from 1.52.162.144
Aug 29 05:56:10 karger wordpress(buerg)[7837]: XML-RPC authentication attempt for unknown user domi from 1.52.162.144
...
2020-08-29 15:50:12
89.218.78.226 attack
Unauthorized connection attempt from IP address 89.218.78.226 on Port 445(SMB)
2020-08-29 15:46:23
193.227.11.120 attackspam
445/tcp 445/tcp 445/tcp
[2020-08-20/29]3pkt
2020-08-29 15:58:40
183.239.156.146 attack
Aug 29 09:36:17 ip106 sshd[13271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.239.156.146 
Aug 29 09:36:19 ip106 sshd[13271]: Failed password for invalid user eco from 183.239.156.146 port 35668 ssh2
...
2020-08-29 15:52:29
202.111.192.18 attack
Unauthorized connection attempt from IP address 202.111.192.18 on Port 445(SMB)
2020-08-29 15:48:52
51.178.85.190 attack
Invalid user debian from 51.178.85.190 port 45200
2020-08-29 15:37:29

Recently Reported IPs

39.173.188.66 43.11.96.40 59.156.175.232 166.77.224.159
199.210.54.15 88.166.106.108 7.241.73.55 46.145.37.170
12.215.221.181 216.54.121.53 201.228.245.215 64.82.7.69
241.243.19.95 176.27.29.241 19.109.219.5 144.12.138.48
84.94.208.35 70.255.127.154 174.216.4.240 218.45.128.98