Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Concord

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.113.189.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.113.189.114.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060100 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 01 19:13:07 CST 2020
;; MSG SIZE  rcvd: 118
Host info
114.189.113.99.in-addr.arpa domain name pointer 99-113-189-114.lightspeed.sntcca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.189.113.99.in-addr.arpa	name = 99-113-189-114.lightspeed.sntcca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
181.22.6.114 attackspam
Brute force attempt
2020-08-02 00:57:08
139.170.150.254 attackbots
sshd
2020-08-02 01:17:38
85.209.0.159 attack
$f2bV_matches
2020-08-02 00:47:14
105.160.103.98 attackbotsspam
Email rejected due to spam filtering
2020-08-02 01:01:31
222.186.42.7 attack
Aug  1 13:09:23 NPSTNNYC01T sshd[15151]: Failed password for root from 222.186.42.7 port 30677 ssh2
Aug  1 13:09:37 NPSTNNYC01T sshd[15167]: Failed password for root from 222.186.42.7 port 58702 ssh2
...
2020-08-02 01:12:24
68.183.219.181 attackspam
fail2ban detected bruce force on ssh iptables
2020-08-02 00:38:43
94.190.35.174 attack
1596284327 - 08/01/2020 14:18:47 Host: 94.190.35.174/94.190.35.174 Port: 23 TCP Blocked
2020-08-02 01:17:07
14.63.167.192 attackbotsspam
sshd
2020-08-02 00:56:14
187.189.31.243 attack
$f2bV_matches
2020-08-02 01:14:19
119.29.205.228 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-08-02 01:03:06
58.186.109.213 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 01:02:00
91.72.171.138 attackbots
Aug  1 16:09:11 vm0 sshd[16560]: Failed password for root from 91.72.171.138 port 47904 ssh2
...
2020-08-02 01:03:56
1.220.68.196 attackspambots
Telnetd brute force attack detected by fail2ban
2020-08-02 00:55:15
49.234.45.241 attackspam
SSH Brute Force
2020-08-02 00:43:56
66.249.66.133 attackspambots
[01/Aug/2020:14:18:48 +0200] Web-Request: "GET /.well-known/assetlinks.json", User-Agent: "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
2020-08-02 01:13:26

Recently Reported IPs

92.236.159.208 16.196.254.8 141.212.124.103 114.105.134.23
24.252.183.221 150.249.160.211 179.18.2.78 122.121.25.111
180.252.102.79 78.14.132.130 159.119.172.71 116.110.165.93
136.234.16.215 105.88.14.233 57.171.218.8 136.109.102.151
116.98.173.166 218.136.116.55 172.50.32.197 215.201.202.223