Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fredrikstad

Region: unknown

Country: Norway

Internet Service Provider: Telia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 84.210.11.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;84.210.11.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:01:20 CST 2025
;; MSG SIZE  rcvd: 105
Host info
99.11.210.84.in-addr.arpa domain name pointer cm-84.210.11.99.get.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.11.210.84.in-addr.arpa	name = cm-84.210.11.99.get.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
128.199.235.18 attackspam
Invalid user robertparker from 128.199.235.18 port 60708
2020-05-24 06:35:23
188.166.117.213 attackspam
Invalid user wpj from 188.166.117.213 port 49734
2020-05-24 06:32:17
123.14.5.115 attackspam
SSH Invalid Login
2020-05-24 06:43:43
212.144.102.183 attack
May 24 01:08:11 taivassalofi sshd[78019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.144.102.183
May 24 01:08:13 taivassalofi sshd[78019]: Failed password for invalid user crccfc from 212.144.102.183 port 36706 ssh2
...
2020-05-24 06:32:56
83.167.87.198 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-05-24 06:20:14
94.191.66.227 attackbotsspam
Invalid user dfq from 94.191.66.227 port 55344
2020-05-24 06:15:42
179.106.41.17 attack
2020-05-24T00:19:06.970578  sshd[474]: Invalid user tla from 179.106.41.17 port 44288
2020-05-24T00:19:06.986553  sshd[474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.106.41.17
2020-05-24T00:19:06.970578  sshd[474]: Invalid user tla from 179.106.41.17 port 44288
2020-05-24T00:19:09.176918  sshd[474]: Failed password for invalid user tla from 179.106.41.17 port 44288 ssh2
...
2020-05-24 06:25:30
115.238.97.2 attack
Invalid user rru from 115.238.97.2 port 13350
2020-05-24 06:53:11
177.11.156.212 attackbots
Invalid user oracle from 177.11.156.212 port 37522
2020-05-24 06:45:12
104.248.121.67 attack
Invalid user gyu from 104.248.121.67 port 40938
2020-05-24 06:19:55
51.38.80.173 attack
Invalid user meu from 51.38.80.173 port 50990
2020-05-24 06:27:40
187.20.250.88 attackbotsspam
Invalid user taj from 187.20.250.88 port 10721
2020-05-24 06:32:42
104.248.126.170 attackbotsspam
Invalid user uel from 104.248.126.170 port 43118
2020-05-24 06:52:15
54.39.104.201 attack
[2020-05-23 17:44:13] NOTICE[1157][C-000089db] chan_sip.c: Call from '' (54.39.104.201:8904) to extension '099441519460088' rejected because extension not found in context 'public'.
[2020-05-23 17:44:13] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-23T17:44:13.005-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="099441519460088",SessionID="0x7f5f10678288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/54.39.104.201/8904",ACLName="no_extension_match"
[2020-05-23 17:52:08] NOTICE[1157][C-000089ea] chan_sip.c: Call from '' (54.39.104.201:5645) to extension '1000441519460088' rejected because extension not found in context 'public'.
[2020-05-23 17:52:08] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-23T17:52:08.115-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1000441519460088",SessionID="0x7f5f100266a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5
...
2020-05-24 06:42:16
139.155.39.22 attackspam
Invalid user noo from 139.155.39.22 port 53664
2020-05-24 06:19:41

Recently Reported IPs

130.99.98.144 78.244.129.154 233.42.186.251 129.121.107.183
84.94.71.29 205.238.70.167 97.74.183.234 133.153.30.246
103.93.127.139 91.244.70.127 46.26.157.37 218.20.213.225
68.17.170.239 218.170.190.196 194.197.149.240 210.97.179.98
203.242.210.107 213.199.126.247 122.238.111.229 228.244.96.225