Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.99.194.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;98.99.194.10.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020052501 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 26 07:14:54 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 10.194.99.98.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 10.194.99.98.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
138.197.78.121 attack
Nov  3 21:49:57 web1 sshd\[12381\]: Invalid user 12345 from 138.197.78.121
Nov  3 21:49:57 web1 sshd\[12381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.78.121
Nov  3 21:49:59 web1 sshd\[12381\]: Failed password for invalid user 12345 from 138.197.78.121 port 47990 ssh2
Nov  3 21:53:39 web1 sshd\[12701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.78.121  user=root
Nov  3 21:53:41 web1 sshd\[12701\]: Failed password for root from 138.197.78.121 port 58074 ssh2
2019-11-04 15:58:53
103.115.104.229 attackbotsspam
Nov  4 08:10:22 lnxweb61 sshd[19538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.104.229
2019-11-04 16:24:28
27.128.162.98 attackbots
2019-11-04T09:10:32.063604scmdmz1 sshd\[27017\]: Invalid user contec from 27.128.162.98 port 57334
2019-11-04T09:10:32.066101scmdmz1 sshd\[27017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.162.98
2019-11-04T09:10:34.062303scmdmz1 sshd\[27017\]: Failed password for invalid user contec from 27.128.162.98 port 57334 ssh2
...
2019-11-04 16:14:03
153.3.232.177 attackbots
Nov  4 14:10:41 webhost01 sshd[17366]: Failed password for root from 153.3.232.177 port 35926 ssh2
...
2019-11-04 16:05:23
112.170.78.118 attack
Nov  4 12:08:14 gw1 sshd[20930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.78.118
Nov  4 12:08:17 gw1 sshd[20930]: Failed password for invalid user yw from 112.170.78.118 port 33318 ssh2
...
2019-11-04 16:08:55
13.80.16.119 attackbots
Time:     Mon Nov  4 03:15:09 2019 -0300
IP:       13.80.16.119 (NL/Netherlands/-)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-11-04 16:15:04
187.174.191.154 attack
detected by Fail2Ban
2019-11-04 15:57:53
106.12.77.212 attackbots
Nov  4 02:27:07 ny01 sshd[10197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.212
Nov  4 02:27:09 ny01 sshd[10197]: Failed password for invalid user ubuntu from 106.12.77.212 port 44606 ssh2
Nov  4 02:31:45 ny01 sshd[10749]: Failed password for root from 106.12.77.212 port 35732 ssh2
2019-11-04 15:52:31
218.205.113.204 attack
Nov  4 07:55:18 localhost sshd\[78664\]: Invalid user 123456 from 218.205.113.204 port 55034
Nov  4 07:55:18 localhost sshd\[78664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.205.113.204
Nov  4 07:55:20 localhost sshd\[78664\]: Failed password for invalid user 123456 from 218.205.113.204 port 55034 ssh2
Nov  4 08:05:00 localhost sshd\[78901\]: Invalid user es123 from 218.205.113.204 port 54446
Nov  4 08:05:00 localhost sshd\[78901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.205.113.204
...
2019-11-04 16:22:28
188.163.109.153 attackspambots
0,55-02/02 [bc01/m07] PostRequest-Spammer scoring: luanda
2019-11-04 15:57:16
118.25.231.17 attackbotsspam
Nov  4 07:30:08 dedicated sshd[24623]: Invalid user viedeo from 118.25.231.17 port 33534
2019-11-04 16:08:20
190.85.234.215 attackspambots
Nov  3 22:09:11 eddieflores sshd\[9916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.234.215  user=root
Nov  3 22:09:13 eddieflores sshd\[9916\]: Failed password for root from 190.85.234.215 port 37968 ssh2
Nov  3 22:13:28 eddieflores sshd\[10295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.234.215  user=root
Nov  3 22:13:30 eddieflores sshd\[10295\]: Failed password for root from 190.85.234.215 port 47924 ssh2
Nov  3 22:17:43 eddieflores sshd\[10651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.234.215  user=root
2019-11-04 16:19:18
190.69.152.115 attackspam
Fail2Ban Ban Triggered
2019-11-04 15:56:24
145.239.89.243 attack
Nov  4 08:35:06 ArkNodeAT sshd\[16090\]: Invalid user test from 145.239.89.243
Nov  4 08:35:06 ArkNodeAT sshd\[16090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.89.243
Nov  4 08:35:08 ArkNodeAT sshd\[16090\]: Failed password for invalid user test from 145.239.89.243 port 49084 ssh2
2019-11-04 15:58:36
117.103.2.226 attack
Nov  4 08:32:48 vpn01 sshd[12499]: Failed password for backup from 117.103.2.226 port 37436 ssh2
Nov  4 08:37:29 vpn01 sshd[12554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.103.2.226
...
2019-11-04 15:50:56

Recently Reported IPs

85.54.28.253 177.117.88.249 119.85.56.61 188.236.69.187
109.56.255.81 79.116.215.20 102.122.67.210 84.73.133.33
128.199.41.141 176.223.7.174 212.227.132.205 123.75.129.132
213.143.47.198 180.52.96.108 36.253.30.103 196.99.19.236
52.37.232.241 77.42.81.243 187.213.157.117 61.69.131.207