Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.249.99.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17902
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.249.99.70.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022502 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 05:45:20 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 70.99.249.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.99.249.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.225.38.205 attack
Sep 30 01:11:12 seraph sshd[10529]: Invalid user voicebot from 186.225.38.2=
05
Sep 30 01:11:12 seraph sshd[10529]: pam_unix(sshd:auth): authentication fai=
lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D186.225.38.205
Sep 30 01:11:15 seraph sshd[10529]: Failed password for invalid user voiceb=
ot from 186.225.38.205 port 33104 ssh2
Sep 30 01:11:15 seraph sshd[10529]: Received disconnect from 186.225.38.205=
 port 33104:11: Bye Bye [preauth]
Sep 30 01:11:15 seraph sshd[10529]: Disconnected from 186.225.38.205 port 3=
3104 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=186.225.38.205
2019-10-03 17:18:06
178.33.49.21 attack
Oct  3 10:31:55 microserver sshd[59582]: Invalid user yf from 178.33.49.21 port 34710
Oct  3 10:31:55 microserver sshd[59582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.49.21
Oct  3 10:31:57 microserver sshd[59582]: Failed password for invalid user yf from 178.33.49.21 port 34710 ssh2
Oct  3 10:36:09 microserver sshd[60240]: Invalid user abrahim from 178.33.49.21 port 46598
Oct  3 10:36:09 microserver sshd[60240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.49.21
Oct  3 10:48:34 microserver sshd[61779]: Invalid user teamspeak2 from 178.33.49.21 port 54026
Oct  3 10:48:34 microserver sshd[61779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.49.21
Oct  3 10:48:36 microserver sshd[61779]: Failed password for invalid user teamspeak2 from 178.33.49.21 port 54026 ssh2
Oct  3 10:52:54 microserver sshd[62459]: Invalid user cisco from 178.33.49.21 port 37678
Oct  3 1
2019-10-03 17:17:11
103.41.23.76 attack
Oct  3 01:56:59 vtv3 sshd\[28487\]: Invalid user octest from 103.41.23.76 port 58768
Oct  3 01:56:59 vtv3 sshd\[28487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.41.23.76
Oct  3 01:57:01 vtv3 sshd\[28487\]: Failed password for invalid user octest from 103.41.23.76 port 58768 ssh2
Oct  3 02:02:18 vtv3 sshd\[31136\]: Invalid user jira from 103.41.23.76 port 42610
Oct  3 02:02:18 vtv3 sshd\[31136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.41.23.76
Oct  3 02:12:23 vtv3 sshd\[4109\]: Invalid user bkksextoy from 103.41.23.76 port 38510
Oct  3 02:12:23 vtv3 sshd\[4109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.41.23.76
Oct  3 02:12:24 vtv3 sshd\[4109\]: Failed password for invalid user bkksextoy from 103.41.23.76 port 38510 ssh2
Oct  3 02:17:23 vtv3 sshd\[6473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=10
2019-10-03 16:59:12
139.155.118.190 attackbotsspam
Oct  3 10:42:09 dedicated sshd[22524]: Invalid user martinez from 139.155.118.190 port 48092
2019-10-03 17:00:25
112.133.229.84 attackbotsspam
Unauthorised access (Oct  3) SRC=112.133.229.84 LEN=52 TTL=107 ID=29004 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-03 17:05:46
80.186.165.226 attack
Oct  3 11:11:10 www sshd\[213957\]: Invalid user Admin from 80.186.165.226
Oct  3 11:11:10 www sshd\[213957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.186.165.226
Oct  3 11:11:12 www sshd\[213957\]: Failed password for invalid user Admin from 80.186.165.226 port 40616 ssh2
...
2019-10-03 16:45:53
106.53.91.14 attackspam
Oct  2 21:43:55 hpm sshd\[1923\]: Invalid user db2fenc1 from 106.53.91.14
Oct  2 21:43:55 hpm sshd\[1923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.91.14
Oct  2 21:43:57 hpm sshd\[1923\]: Failed password for invalid user db2fenc1 from 106.53.91.14 port 59206 ssh2
Oct  2 21:47:58 hpm sshd\[2272\]: Invalid user pushousi from 106.53.91.14
Oct  2 21:47:58 hpm sshd\[2272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.91.14
2019-10-03 17:17:41
82.196.3.212 attack
Automatic report - Banned IP Access
2019-10-03 17:04:03
115.238.236.74 attack
Oct  3 10:32:17 OPSO sshd\[27969\]: Invalid user norby from 115.238.236.74 port 38507
Oct  3 10:32:17 OPSO sshd\[27969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74
Oct  3 10:32:19 OPSO sshd\[27969\]: Failed password for invalid user norby from 115.238.236.74 port 38507 ssh2
Oct  3 10:36:43 OPSO sshd\[29068\]: Invalid user spy from 115.238.236.74 port 19095
Oct  3 10:36:43 OPSO sshd\[29068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74
2019-10-03 16:58:52
142.93.238.162 attack
Oct  3 10:22:10 DAAP sshd[25754]: Invalid user demouser from 142.93.238.162 port 36214
Oct  3 10:22:10 DAAP sshd[25754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.238.162
Oct  3 10:22:10 DAAP sshd[25754]: Invalid user demouser from 142.93.238.162 port 36214
Oct  3 10:22:12 DAAP sshd[25754]: Failed password for invalid user demouser from 142.93.238.162 port 36214 ssh2
...
2019-10-03 17:05:05
37.195.105.57 attackspambots
2019-10-03T08:40:58.752958abusebot.cloudsearch.cf sshd\[8700\]: Invalid user st from 37.195.105.57 port 48609
2019-10-03 16:51:15
112.84.60.111 attackspam
[Aegis] @ 2019-10-03 04:55:08  0100 -> Sendmail rejected message.
2019-10-03 16:42:41
138.94.114.238 attackbots
2019-09-01 07:30:40,465 fail2ban.actions        [804]: NOTICE  [sshd] Ban 138.94.114.238
2019-09-01 10:41:05,884 fail2ban.actions        [804]: NOTICE  [sshd] Ban 138.94.114.238
2019-09-01 13:49:54,855 fail2ban.actions        [804]: NOTICE  [sshd] Ban 138.94.114.238
...
2019-10-03 17:04:22
103.74.71.143 normal
Bad ipbaddb not open
2019-10-03 16:47:59
163.172.216.150 attackbots
Automatic report - XMLRPC Attack
2019-10-03 16:42:18

Recently Reported IPs

103.59.176.129 103.59.176.137 103.59.176.141 103.59.38.77
103.59.39.62 103.59.4.21 103.59.43.158 103.59.43.167
103.59.43.212 103.59.43.246 103.59.53.29 103.59.56.178
103.59.72.130 103.59.73.34 5.6.9.66 103.59.74.77
103.59.75.114 103.59.75.168 103.6.10.252 103.6.10.50