Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.99.242.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14574
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;63.99.242.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 13:44:31 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 44.242.99.63.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 44.242.99.63.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
190.211.104.61 attackbots
Nov  4 00:47:15 taivassalofi sshd[71733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.104.61
Nov  4 00:47:17 taivassalofi sshd[71733]: Failed password for invalid user reg from 190.211.104.61 port 54404 ssh2
...
2019-11-04 06:53:48
104.248.16.130 attackspam
xmlrpc attack
2019-11-04 06:22:58
221.162.255.82 attack
Nov  3 21:02:10 MK-Soft-VM7 sshd[19867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.162.255.82 
Nov  3 21:02:13 MK-Soft-VM7 sshd[19867]: Failed password for invalid user azur from 221.162.255.82 port 41362 ssh2
...
2019-11-04 06:24:23
117.102.68.188 attack
Nov  3 23:27:05 vps647732 sshd[9859]: Failed password for root from 117.102.68.188 port 34860 ssh2
...
2019-11-04 06:43:38
182.73.222.70 attack
$f2bV_matches
2019-11-04 06:27:51
41.215.164.239 attackspam
Unauthorized connection attempt from IP address 41.215.164.239 on Port 445(SMB)
2019-11-04 07:01:15
148.70.18.216 attackspam
Nov  4 00:45:01 sauna sshd[209343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.18.216
Nov  4 00:45:03 sauna sshd[209343]: Failed password for invalid user 123456 from 148.70.18.216 port 45822 ssh2
...
2019-11-04 06:50:46
185.176.27.246 attackspam
Multiport scan : 30 ports scanned 10006 10906 11206 11306 11406 11806 11906 12206 12306 12506 13006 13106 13206 13706 14206 14306 15406 16006 16206 16406 16706 17006 17106 18406 18806 18906 19106 19206 19506 19706
2019-11-04 06:54:42
89.165.3.1 attack
Unauthorized connection attempt from IP address 89.165.3.1 on Port 445(SMB)
2019-11-04 06:57:07
14.140.207.62 attack
Unauthorized connection attempt from IP address 14.140.207.62 on Port 445(SMB)
2019-11-04 06:58:39
77.34.32.47 attackbotsspam
Chat Spam
2019-11-04 06:36:58
118.89.33.81 attackspam
Fail2Ban - SSH Bruteforce Attempt
2019-11-04 06:32:46
180.179.120.70 attackbots
$f2bV_matches
2019-11-04 06:52:08
45.100.30.118 attackbots
Unauthorized connection attempt from IP address 45.100.30.118 on Port 445(SMB)
2019-11-04 06:37:15
118.69.10.108 attack
Unauthorized connection attempt from IP address 118.69.10.108 on Port 445(SMB)
2019-11-04 06:52:51

Recently Reported IPs

28.3.34.118 104.36.31.226 77.143.251.170 51.148.40.192
43.55.59.160 209.9.97.232 179.179.144.47 220.104.156.176
231.191.12.111 48.112.88.254 237.31.214.125 69.134.176.1
129.158.222.101 70.121.43.252 2.182.26.215 195.0.28.65
27.11.104.112 80.99.126.42 107.93.186.102 180.240.149.184