Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.114.113.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.114.113.61.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 22:06:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
61.113.114.99.in-addr.arpa domain name pointer 99-114-113-61.lightspeed.mtryca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
61.113.114.99.in-addr.arpa	name = 99-114-113-61.lightspeed.mtryca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.63.120 attack
Apr 29 21:18:27 ip-172-31-61-156 sshd[1001]: Invalid user nizar from 106.13.63.120
...
2020-04-30 06:06:14
106.12.82.80 attackbotsspam
Brute-force attempt banned
2020-04-30 06:16:11
51.158.117.176 attackbotsspam
April 29 2020, 22:15:13 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-04-30 06:28:25
209.141.55.11 attackspambots
Apr 30 00:10:10 s1 sshd\[16154\]: Invalid user test from 209.141.55.11 port 37520
Apr 30 00:10:10 s1 sshd\[16152\]: Invalid user ec2-user from 209.141.55.11 port 37506
Apr 30 00:10:10 s1 sshd\[16146\]: Invalid user java from 209.141.55.11 port 37516
Apr 30 00:10:10 s1 sshd\[16149\]: User root from 209.141.55.11 not allowed because not listed in AllowUsers
Apr 30 00:10:10 s1 sshd\[16143\]: Invalid user devops from 209.141.55.11 port 37508
Apr 30 00:10:10 s1 sshd\[16148\]: User root from 209.141.55.11 not allowed because not listed in AllowUsers
Apr 30 00:10:10 s1 sshd\[16144\]: Invalid user guest from 209.141.55.11 port 37510
Apr 30 00:10:10 s1 sshd\[16145\]: Invalid user postgres from 209.141.55.11 port 37524
Apr 30 00:10:10 s1 sshd\[16142\]: Invalid user oracle from 209.141.55.11 port 37518
Apr 30 00:10:10 s1 sshd\[16147\]: Invalid user user from 209.141.55.11 port 37528
Apr 30 00:10:10 s1 sshd\[16150\]: Invalid user ubuntu from 209.141.55.11 port 37530
Apr 30 00:10:10 s1 sshd\[16153\]: Invalid user openvpn
2020-04-30 06:13:28
222.186.175.167 attack
[ssh] SSH attack
2020-04-30 06:34:26
51.75.206.210 attack
Invalid user web1 from 51.75.206.210 port 42712
2020-04-30 06:37:18
51.91.79.232 attackspam
Invalid user profe from 51.91.79.232 port 54066
2020-04-30 06:01:10
162.243.139.140 attack
proto=tcp  .  spt=51836  .  dpt=143  .  src=162.243.139.140  .  dst=xx.xx.4.1  .     Found on   Alienvault      (360)
2020-04-30 06:08:45
114.252.240.237 attack
DATE:2020-04-30 00:21:18, IP:114.252.240.237, PORT:ssh SSH brute force auth (docker-dc)
2020-04-30 06:31:00
190.103.125.199 attackspambots
proto=tcp  .  spt=54673  .  dpt=25  .     Found on   Dark List de      (358)
2020-04-30 06:13:47
222.186.42.137 attack
Apr 30 03:21:55 gw1 sshd[31394]: Failed password for root from 222.186.42.137 port 51458 ssh2
...
2020-04-30 06:25:15
54.39.98.253 attackspam
5x Failed Password
2020-04-30 06:18:29
5.63.107.154 attackspambots
Automatic report - Port Scan Attack
2020-04-30 06:23:27
212.129.6.184 attackbots
Apr 30 00:29:27 plex sshd[18559]: Invalid user rodrigo from 212.129.6.184 port 44714
2020-04-30 06:40:32
180.76.104.140 attackbotsspam
Invalid user cronuser from 180.76.104.140 port 53390
2020-04-30 06:26:53

Recently Reported IPs

29.35.37.160 236.112.16.65 131.226.172.73 84.215.73.154
149.67.50.15 117.206.53.107 28.68.154.82 101.193.203.42
20.145.118.174 204.156.180.201 168.197.139.53 146.173.61.82
204.104.189.2 49.205.118.223 163.181.223.112 154.23.30.27
87.177.194.182 33.194.100.38 150.162.205.19 138.149.255.66