Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.133.30.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.133.30.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 158 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:44:18 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 64.30.133.99.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 99.133.30.64.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.190 attackbotsspam
firewall-block, port(s): 58171/tcp
2020-08-19 03:11:40
103.228.183.10 attackspam
Bruteforce detected by fail2ban
2020-08-19 03:09:38
193.27.229.207 attack
ET DROP Dshield Block Listed Source group 1 - port: 23359 proto: tcp cat: Misc Attackbytes: 60
2020-08-19 03:10:30
80.90.82.70 attackspam
REQUESTED PAGE: /wp-login.php
2020-08-19 02:52:14
157.245.244.161 attack
SpamScore above: 10.0
2020-08-19 02:41:03
119.29.152.172 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-08-19 02:54:33
42.243.76.31 attack
Auto Detect Rule!
proto TCP (SYN), 42.243.76.31:48197->gjan.info:23, len 40
2020-08-19 03:00:24
64.227.101.130 attackbots
 UDP 64.227.101.130:53649 -> port 53413, len 45
2020-08-19 02:50:03
170.130.140.135 attack
Email rejected due to spam filtering
2020-08-19 03:04:20
95.140.19.34 attackbots
Unauthorized connection attempt from IP address 95.140.19.34 on Port 445(SMB)
2020-08-19 02:46:16
79.137.72.171 attackbotsspam
fail2ban detected bruce force on ssh iptables
2020-08-19 03:08:50
122.152.49.230 attackspam
Unauthorized connection attempt from IP address 122.152.49.230 on Port 445(SMB)
2020-08-19 02:59:25
196.52.43.116 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-19 03:02:45
51.254.12.20 attackbots
IP: 51.254.12.20
Ports affected
    Simple Mail Transfer (25) 
Found in DNSBL('s)
ASN Details
   AS16276 OVH SAS
   France (FR)
   CIDR 51.254.0.0/15
Log Date: 18/08/2020 11:08:14 AM UTC
2020-08-19 03:09:20
185.163.237.248 attackspam
Unauthorized connection attempt from IP address 185.163.237.248 on Port 445(SMB)
2020-08-19 02:40:37

Recently Reported IPs

205.207.238.195 12.142.117.42 103.238.136.157 174.254.197.195
13.18.202.8 199.162.19.198 109.249.55.164 167.3.123.6
5.40.84.52 8.18.206.87 91.91.82.118 190.253.227.247
237.155.240.29 156.115.63.249 200.79.185.34 232.212.0.89
234.103.147.49 75.164.130.191 165.36.109.71 19.74.136.227