Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lagos

Region: Lagos

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.58.99.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.58.99.207.			IN	A

;; AUTHORITY SECTION:
.			466	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101200 1800 900 604800 86400

;; Query time: 142 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 13 02:57:56 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 207.99.58.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.99.58.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
145.239.95.9 attackspam
Oct 13 10:18:26 * sshd[16606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.95.9
Oct 13 10:18:28 * sshd[16606]: Failed password for invalid user Aida from 145.239.95.9 port 35908 ssh2
2020-10-13 16:45:56
106.198.209.28 attack
1602535560 - 10/12/2020 22:46:00 Host: 106.198.209.28/106.198.209.28 Port: 445 TCP Blocked
...
2020-10-13 16:41:25
103.220.76.197 attackspambots
Unauthorized connection attempt from IP address 103.220.76.197 on Port 445(SMB)
2020-10-13 16:44:11
110.185.104.126 attack
Oct 13 17:13:55 web1 sshd[7964]: Invalid user brian from 110.185.104.126 port 38324
Oct 13 17:13:55 web1 sshd[7964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.185.104.126
Oct 13 17:13:55 web1 sshd[7964]: Invalid user brian from 110.185.104.126 port 38324
Oct 13 17:13:57 web1 sshd[7964]: Failed password for invalid user brian from 110.185.104.126 port 38324 ssh2
Oct 13 17:44:41 web1 sshd[18539]: Invalid user test from 110.185.104.126 port 53144
Oct 13 17:44:41 web1 sshd[18539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.185.104.126
Oct 13 17:44:41 web1 sshd[18539]: Invalid user test from 110.185.104.126 port 53144
Oct 13 17:44:43 web1 sshd[18539]: Failed password for invalid user test from 110.185.104.126 port 53144 ssh2
Oct 13 17:49:26 web1 sshd[20107]: Invalid user lisa from 110.185.104.126 port 51420
...
2020-10-13 16:17:48
213.136.68.142 attack
Oct 13 09:39:26 ip106 sshd[25920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.136.68.142 
Oct 13 09:39:28 ip106 sshd[25920]: Failed password for invalid user anthony from 213.136.68.142 port 47774 ssh2
...
2020-10-13 16:35:53
5.188.206.200 attackspam
Oct 13 09:35:04 mail postfix/smtpd\[12208\]: warning: unknown\[5.188.206.200\]: SASL PLAIN authentication failed: \
Oct 13 09:35:22 mail postfix/smtpd\[12208\]: warning: unknown\[5.188.206.200\]: SASL PLAIN authentication failed: \
Oct 13 10:10:37 mail postfix/smtpd\[13757\]: warning: unknown\[5.188.206.200\]: SASL PLAIN authentication failed: \
Oct 13 10:10:53 mail postfix/smtpd\[13757\]: warning: unknown\[5.188.206.200\]: SASL PLAIN authentication failed: \
2020-10-13 16:18:09
134.17.94.221 attack
2020-10-10T19:26:55.141739kitsunetech sshd[26513]: Invalid user photo from 134.17.94.221 port 2842
2020-10-13 16:20:33
138.59.40.199 attackspambots
Attempted Brute Force (dovecot)
2020-10-13 16:38:14
109.125.137.170 attackspambots
$lgm
2020-10-13 16:23:15
106.54.65.144 attackbots
Oct 13 09:30:35 Ubuntu-1404-trusty-64-minimal sshd\[32374\]: Invalid user sanchez from 106.54.65.144
Oct 13 09:30:35 Ubuntu-1404-trusty-64-minimal sshd\[32374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.65.144
Oct 13 09:30:38 Ubuntu-1404-trusty-64-minimal sshd\[32374\]: Failed password for invalid user sanchez from 106.54.65.144 port 43390 ssh2
Oct 13 09:37:24 Ubuntu-1404-trusty-64-minimal sshd\[7164\]: Invalid user hirabaya from 106.54.65.144
Oct 13 09:37:24 Ubuntu-1404-trusty-64-minimal sshd\[7164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.65.144
2020-10-13 16:38:52
107.182.30.122 attackspam
Oct 12 22:37:25 ovpn sshd\[24102\]: Invalid user samuel from 107.182.30.122
Oct 12 22:37:25 ovpn sshd\[24102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.30.122
Oct 12 22:37:26 ovpn sshd\[24102\]: Failed password for invalid user samuel from 107.182.30.122 port 52876 ssh2
Oct 12 22:45:54 ovpn sshd\[26221\]: Invalid user stalin from 107.182.30.122
Oct 12 22:45:55 ovpn sshd\[26221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.30.122
2020-10-13 16:46:51
142.93.167.15 attackbotsspam
Oct 13 08:18:35 pornomens sshd\[30328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.167.15  user=root
Oct 13 08:18:37 pornomens sshd\[30328\]: Failed password for root from 142.93.167.15 port 60700 ssh2
Oct 13 08:25:54 pornomens sshd\[30453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.167.15  user=root
...
2020-10-13 16:18:54
139.199.94.100 attackspam
$f2bV_matches
2020-10-13 16:34:04
106.52.135.44 attackspam
fail2ban: brute force SSH detected
2020-10-13 16:53:39
185.132.53.115 attack
Oct 13 10:06:29 ns1 sshd[78677]: Did not receive identification string from 185.132.53.115 port 44168
Oct 13 10:06:33 ns1 sshd[78678]: Unable to negotiate with 185.132.53.115 port 40660: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Oct 13 10:06:49 ns1 sshd[78680]: Unable to negotiate with 185.132.53.115 port 41618: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Oct 13 10:07:05 ns1 sshd[78682]: Unable to negotiate with 185.132.53.115 port 42644: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Oct 13 10:07:20 ns1 sshd[78684]: Unable to negotiate with 185.132.53.115 port 43726: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-e
...
2020-10-13 16:28:43

Recently Reported IPs

114.187.225.234 34.193.82.186 99.63.124.51 161.9.150.122
61.163.234.85 110.177.13.36 27.204.0.93 200.164.157.51
104.197.200.111 212.11.102.199 58.165.237.241 193.226.158.232
2.9.161.117 3.145.163.21 197.44.174.49 139.81.110.57
119.235.4.208 83.52.136.133 153.225.240.160 88.165.226.210