Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Minneapolis

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.131.34.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4401
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;64.131.34.99.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070200 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 02 17:41:20 CST 2020
;; MSG SIZE  rcvd: 116
Host info
99.34.131.64.in-addr.arpa domain name pointer 64-131-34-99.usfamily.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.34.131.64.in-addr.arpa	name = 64-131-34-99.usfamily.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.196.69.227 attack
Jun 28 14:30:52 vps sshd[956651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns378983.ip-5-196-69.eu
Jun 28 14:30:54 vps sshd[956651]: Failed password for invalid user bruno from 5.196.69.227 port 45934 ssh2
Jun 28 14:36:14 vps sshd[982853]: Invalid user zd from 5.196.69.227 port 44994
Jun 28 14:36:14 vps sshd[982853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns378983.ip-5-196-69.eu
Jun 28 14:36:15 vps sshd[982853]: Failed password for invalid user zd from 5.196.69.227 port 44994 ssh2
...
2020-06-28 20:52:49
212.237.46.9 attackspambots
Jun 28 14:15:00 srv sshd[11127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.46.9
2020-06-28 20:52:00
176.99.139.50 attackbotsspam
SMB Server BruteForce Attack
2020-06-28 20:31:57
112.72.96.180 attack
Unauthorized connection attempt from IP address 112.72.96.180 on Port 445(SMB)
2020-06-28 20:39:18
103.214.60.130 attackspam
SS5,WP GET /wp-login.php
2020-06-28 21:10:24
85.209.0.101 attackspam
 TCP (SYN) 85.209.0.101:36910 -> port 22, len 60
2020-06-28 21:02:01
41.100.224.249 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-28 20:42:52
78.62.153.117 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-28 20:57:36
202.134.0.9 attackspam
TCP port : 1618
2020-06-28 20:41:53
51.255.35.58 attackspambots
Jun 28 14:47:58 ns381471 sshd[5835]: Failed password for root from 51.255.35.58 port 40881 ssh2
2020-06-28 20:58:01
162.243.131.158 attackspam
1930/tcp 8088/tcp 9160/tcp
[2020-04-27/06-28]3pkt
2020-06-28 20:53:06
178.33.12.237 attackspam
Jun 28 14:09:33 ns381471 sshd[31505]: Failed password for irc from 178.33.12.237 port 41511 ssh2
2020-06-28 20:45:31
92.255.199.73 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-28 20:46:50
218.71.141.62 attack
Jun 28 14:40:19 localhost sshd\[20210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.71.141.62  user=root
Jun 28 14:40:21 localhost sshd\[20210\]: Failed password for root from 218.71.141.62 port 43652 ssh2
Jun 28 14:42:38 localhost sshd\[20261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.71.141.62  user=root
Jun 28 14:42:39 localhost sshd\[20261\]: Failed password for root from 218.71.141.62 port 41288 ssh2
Jun 28 14:45:08 localhost sshd\[20431\]: Invalid user zhang from 218.71.141.62
...
2020-06-28 21:04:56
223.207.246.194 attackbotsspam
Unauthorized connection attempt from IP address 223.207.246.194 on Port 445(SMB)
2020-06-28 20:43:57

Recently Reported IPs

96.178.181.122 125.194.51.51 175.200.2.11 133.54.176.43
82.94.150.134 156.212.87.112 180.25.131.34 102.87.197.186
79.196.40.37 134.97.17.176 98.0.122.196 190.166.246.91
34.80.57.94 62.181.76.50 12.27.198.106 217.78.33.32
156.159.231.15 96.118.192.226 98.233.238.84 41.7.104.160