Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Riga

Region: Riga

Country: Latvia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.99.149.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.99.149.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:17:13 CST 2025
;; MSG SIZE  rcvd: 106
Host info
241.149.99.83.in-addr.arpa domain name pointer balticom-149-241.balticom.lv.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.149.99.83.in-addr.arpa	name = balticom-149-241.balticom.lv.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.207.146.154 attack
Invalid user admin from 104.207.146.154 port 50740
2019-11-20 03:38:11
113.173.15.132 attack
Invalid user admin from 113.173.15.132 port 52913
2019-11-20 03:35:51
187.95.114.162 attackspam
Invalid user spice from 187.95.114.162 port 48513
2019-11-20 03:25:19
58.254.132.41 attackspam
Nov 19 15:58:06 tuxlinux sshd[27342]: Invalid user alenda from 58.254.132.41 port 54591
Nov 19 15:58:06 tuxlinux sshd[27342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.41 
Nov 19 15:58:06 tuxlinux sshd[27342]: Invalid user alenda from 58.254.132.41 port 54591
Nov 19 15:58:06 tuxlinux sshd[27342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.41 
Nov 19 15:58:06 tuxlinux sshd[27342]: Invalid user alenda from 58.254.132.41 port 54591
Nov 19 15:58:06 tuxlinux sshd[27342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.41 
Nov 19 15:58:08 tuxlinux sshd[27342]: Failed password for invalid user alenda from 58.254.132.41 port 54591 ssh2
...
2019-11-20 03:14:05
104.248.121.67 attack
fraudulent SSH attempt
2019-11-20 03:10:08
187.189.243.22 attackspambots
Invalid user admin from 187.189.243.22 port 59603
2019-11-20 03:25:07
92.207.166.44 attackbots
SSH Brute Force, server-1 sshd[11973]: Failed password for invalid user jinwu from 92.207.166.44 port 39376 ssh2
2019-11-20 03:41:12
175.107.202.112 attackbotsspam
Invalid user admin from 175.107.202.112 port 56512
2019-11-20 03:28:23
186.151.170.222 attackspambots
Invalid user braunheim from 186.151.170.222 port 41727
2019-11-20 03:26:32
117.1.123.217 attackspambots
Invalid user admin from 117.1.123.217 port 47450
2019-11-20 03:05:55
186.210.16.178 attackbotsspam
Invalid user admin from 186.210.16.178 port 47916
2019-11-20 03:26:04
111.224.167.120 attackspambots
Invalid user admin from 111.224.167.120 port 41757
2019-11-20 03:07:14
94.191.79.156 attackbotsspam
2019-11-19T07:20:12.3561481495-001 sshd\[63397\]: Failed password for invalid user siliciu from 94.191.79.156 port 46370 ssh2
2019-11-19T08:24:42.6929681495-001 sshd\[327\]: Invalid user standard from 94.191.79.156 port 53214
2019-11-19T08:24:42.7030041495-001 sshd\[327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.79.156
2019-11-19T08:24:44.7025821495-001 sshd\[327\]: Failed password for invalid user standard from 94.191.79.156 port 53214 ssh2
2019-11-19T08:30:16.0650261495-001 sshd\[562\]: Invalid user piergiorgi from 94.191.79.156 port 60858
2019-11-19T08:30:16.0716241495-001 sshd\[562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.79.156
...
2019-11-20 03:40:30
103.14.33.229 attackspam
Invalid user nagios from 103.14.33.229 port 39708
2019-11-20 03:39:40
69.85.70.44 attackspam
fraudulent SSH attempt
2019-11-20 03:42:21

Recently Reported IPs

219.107.32.29 215.203.124.72 91.0.183.107 225.28.70.201
250.228.162.242 23.130.198.215 215.207.250.152 230.79.239.45
14.56.109.193 196.106.142.69 249.208.184.123 127.101.244.152
99.49.86.127 94.111.111.144 199.202.223.59 48.142.107.198
66.221.179.4 222.246.81.52 28.179.42.254 81.188.10.78