Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.13.40.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30912
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.13.40.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 22:49:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
241.40.13.99.in-addr.arpa domain name pointer 99-13-40-241.lightspeed.bcvloh.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.40.13.99.in-addr.arpa	name = 99-13-40-241.lightspeed.bcvloh.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.15.160 attackspam
Aug 31 17:53:46 TORMINT sshd\[28090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.160  user=root
Aug 31 17:53:48 TORMINT sshd\[28090\]: Failed password for root from 222.186.15.160 port 54680 ssh2
Aug 31 17:53:51 TORMINT sshd\[28090\]: Failed password for root from 222.186.15.160 port 54680 ssh2
...
2019-09-01 06:04:22
36.156.24.78 attack
Sep  1 04:49:13 lcl-usvr-02 sshd[1221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.78  user=root
Sep  1 04:49:15 lcl-usvr-02 sshd[1221]: Failed password for root from 36.156.24.78 port 51956 ssh2
...
2019-09-01 05:56:51
157.230.248.65 attackspam
Aug 31 12:06:43 aiointranet sshd\[3253\]: Invalid user admin from 157.230.248.65
Aug 31 12:06:43 aiointranet sshd\[3253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.248.65
Aug 31 12:06:46 aiointranet sshd\[3253\]: Failed password for invalid user admin from 157.230.248.65 port 21598 ssh2
Aug 31 12:11:13 aiointranet sshd\[4186\]: Invalid user eaf from 157.230.248.65
Aug 31 12:11:13 aiointranet sshd\[4186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.248.65
2019-09-01 06:11:25
193.169.252.171 attack
2019-08-31 13:24:54 SMTP protocol error in "AUTH LOGIN" H=(192.147.25.11) [193.169.252.171] AUTH command used when not advertised
2019-08-31 13:33:24 SMTP protocol error in "AUTH LOGIN" H=(192.147.25.11) [193.169.252.171] AUTH command used when not advertised
2019-08-31 13:41:12 SMTP protocol error in "AUTH LOGIN" H=(192.147.25.11) [193.169.252.171] AUTH command used when not advertised
...
2019-09-01 05:49:13
41.222.196.57 attackbots
Automatic report - Banned IP Access
2019-09-01 05:58:10
139.59.180.53 attackbotsspam
Aug 31 23:49:02 minden010 sshd[21272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.180.53
Aug 31 23:49:03 minden010 sshd[21272]: Failed password for invalid user test from 139.59.180.53 port 60274 ssh2
Aug 31 23:53:58 minden010 sshd[22927]: Failed password for root from 139.59.180.53 port 47356 ssh2
...
2019-09-01 05:59:48
188.166.228.244 attack
Apr 11 20:51:47 vtv3 sshd\[14240\]: Invalid user md from 188.166.228.244 port 42525
Apr 11 20:51:47 vtv3 sshd\[14240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.228.244
Apr 11 20:51:49 vtv3 sshd\[14240\]: Failed password for invalid user md from 188.166.228.244 port 42525 ssh2
Apr 11 21:01:44 vtv3 sshd\[18839\]: Invalid user tq from 188.166.228.244 port 39728
Apr 11 21:01:44 vtv3 sshd\[18839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.228.244
Apr 16 23:54:37 vtv3 sshd\[32634\]: Invalid user applcld from 188.166.228.244 port 33872
Apr 16 23:54:37 vtv3 sshd\[32634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.228.244
Apr 16 23:54:39 vtv3 sshd\[32634\]: Failed password for invalid user applcld from 188.166.228.244 port 33872 ssh2
Apr 17 00:00:52 vtv3 sshd\[3554\]: Invalid user nasa from 188.166.228.244 port 59288
Apr 17 00:00:52 vtv3 sshd\[355
2019-09-01 05:49:41
117.68.197.99 attackspam
Aug3113:28:20server4pure-ftpd:\(\?@121.13.237.38\)[WARNING]Authenticationfailedforuser[www]Aug3113:28:24server4pure-ftpd:\(\?@121.13.237.38\)[WARNING]Authenticationfailedforuser[www]Aug3112:39:36server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]Aug3113:31:48server4pure-ftpd:\(\?@117.68.197.99\)[WARNING]Authenticationfailedforuser[www]Aug3112:38:58server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]Aug3112:39:04server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]Aug3112:39:10server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]Aug3113:08:03server4pure-ftpd:\(\?@125.93.81.120\)[WARNING]Authenticationfailedforuser[www]Aug3112:39:17server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]Aug3112:38:52server4pure-ftpd:\(\?@183.184.50.184\)[WARNING]Authenticationfailedforuser[www]IPAddressesBlocked:121.13.237.38\(CN/China/-\)183.184.50.184\(CN/China/184.50.184.183.adsl-pool.sx.cn\)
2019-09-01 05:44:50
177.39.112.18 attackbotsspam
Aug 31 11:37:05 php1 sshd\[31420\]: Invalid user erp1 from 177.39.112.18
Aug 31 11:37:05 php1 sshd\[31420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.39.112.18
Aug 31 11:37:07 php1 sshd\[31420\]: Failed password for invalid user erp1 from 177.39.112.18 port 42318 ssh2
Aug 31 11:42:16 php1 sshd\[31990\]: Invalid user commando from 177.39.112.18
Aug 31 11:42:16 php1 sshd\[31990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.39.112.18
2019-09-01 05:56:01
193.147.107.45 attackspam
2019-08-31T08:12:57.100844ldap.arvenenaske.de sshd[31081]: Connection from 193.147.107.45 port 38670 on 5.199.128.55 port 22
2019-08-31T08:12:57.437084ldap.arvenenaske.de sshd[31081]: Invalid user teamspeak from 193.147.107.45 port 38670
2019-08-31T08:12:57.441383ldap.arvenenaske.de sshd[31081]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.147.107.45 user=teamspeak
2019-08-31T08:12:57.442469ldap.arvenenaske.de sshd[31081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.147.107.45
2019-08-31T08:12:57.100844ldap.arvenenaske.de sshd[31081]: Connection from 193.147.107.45 port 38670 on 5.199.128.55 port 22
2019-08-31T08:12:57.437084ldap.arvenenaske.de sshd[31081]: Invalid user teamspeak from 193.147.107.45 port 38670
2019-08-31T08:12:59.254770ldap.arvenenaske.de sshd[31081]: Failed password for invalid user teamspeak from 193.147.107.45 port 38670 ssh2
2019-08-31T08:21:38.332847ldap.ar........
------------------------------
2019-09-01 06:13:38
124.6.153.2 attackbots
Aug 31 12:07:40 kapalua sshd\[15908\]: Invalid user sinusbot1 from 124.6.153.2
Aug 31 12:07:40 kapalua sshd\[15908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.6.153.2
Aug 31 12:07:42 kapalua sshd\[15908\]: Failed password for invalid user sinusbot1 from 124.6.153.2 port 42060 ssh2
Aug 31 12:12:28 kapalua sshd\[16455\]: Invalid user vncuser from 124.6.153.2
Aug 31 12:12:28 kapalua sshd\[16455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.6.153.2
2019-09-01 06:16:37
106.12.93.25 attackspam
Invalid user zanni from 106.12.93.25 port 39254
2019-09-01 06:15:59
91.121.110.50 attackspam
Aug 31 19:07:29 h2177944 sshd\[28100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.50  user=root
Aug 31 19:07:31 h2177944 sshd\[28100\]: Failed password for root from 91.121.110.50 port 53009 ssh2
Aug 31 19:11:09 h2177944 sshd\[28210\]: Invalid user vicente from 91.121.110.50 port 46169
Aug 31 19:11:09 h2177944 sshd\[28210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.50
...
2019-09-01 05:54:29
5.56.112.247 attackspam
Unauthorised access (Sep  1) SRC=5.56.112.247 LEN=40 TTL=245 ID=43277 DF TCP DPT=23 WINDOW=14600 SYN
2019-09-01 06:18:36
218.92.0.134 attackspambots
Aug 31 17:53:41 TORMINT sshd\[28087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.134  user=root
Aug 31 17:53:44 TORMINT sshd\[28087\]: Failed password for root from 218.92.0.134 port 35299 ssh2
Aug 31 17:53:46 TORMINT sshd\[28087\]: Failed password for root from 218.92.0.134 port 35299 ssh2
...
2019-09-01 06:06:42

Recently Reported IPs

215.245.78.235 45.225.224.207 171.139.135.100 205.96.94.163
235.172.71.163 186.193.77.149 101.72.237.231 50.53.244.111
231.179.70.63 121.129.98.108 142.224.99.84 48.108.77.96
31.250.142.209 146.170.166.205 131.101.65.205 15.169.91.156
94.164.198.17 16.246.145.171 228.172.245.251 124.105.116.228