Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.138.143.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.138.143.154.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 20:21:55 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 154.143.138.99.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.143.138.99.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.234.194.213 attackbots
Oct 19 03:09:59 www sshd[28741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.194.213  user=r.r
Oct 19 03:10:01 www sshd[28741]: Failed password for r.r from 49.234.194.213 port 60650 ssh2
Oct 19 03:10:01 www sshd[28741]: Received disconnect from 49.234.194.213: 11: Bye Bye [preauth]
Oct 19 03:22:29 www sshd[28910]: Invalid user jesabel from 49.234.194.213
Oct 19 03:22:29 www sshd[28910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.194.213 
Oct 19 03:22:30 www sshd[28910]: Failed password for invalid user jesabel from 49.234.194.213 port 44756 ssh2
Oct 19 03:22:30 www sshd[28910]: Received disconnect from 49.234.194.213: 11: Bye Bye [preauth]
Oct 19 03:26:42 www sshd[28990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.194.213  user=r.r
Oct 19 03:26:44 www sshd[28990]: Failed password for r.r from 49.234.194.213 port 5551........
-------------------------------
2019-10-19 22:21:39
200.54.170.198 attackbots
SSH Bruteforce
2019-10-19 21:58:50
51.15.249.8 attack
[AUTOMATIC REPORT] - 36 tries in total - SSH BRUTE FORCE - IP banned
2019-10-19 21:57:16
106.13.136.3 attackbotsspam
Oct 19 02:14:38 web9 sshd\[6842\]: Invalid user savafr3kingat from 106.13.136.3
Oct 19 02:14:38 web9 sshd\[6842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.136.3
Oct 19 02:14:40 web9 sshd\[6842\]: Failed password for invalid user savafr3kingat from 106.13.136.3 port 39156 ssh2
Oct 19 02:20:29 web9 sshd\[7570\]: Invalid user Blade@2017 from 106.13.136.3
Oct 19 02:20:29 web9 sshd\[7570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.136.3
2019-10-19 21:46:09
201.99.120.13 attack
Oct 19 16:03:07 markkoudstaal sshd[17797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.99.120.13
Oct 19 16:03:09 markkoudstaal sshd[17797]: Failed password for invalid user tuvwxyz from 201.99.120.13 port 24311 ssh2
Oct 19 16:06:37 markkoudstaal sshd[18123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.99.120.13
2019-10-19 22:12:42
183.82.32.223 attackbots
Unauthorised access (Oct 19) SRC=183.82.32.223 LEN=52 PREC=0x20 TTL=114 ID=3482 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-19 22:26:06
201.163.180.183 attackspam
Oct 19 03:45:05 hpm sshd\[14763\]: Invalid user sysbackup from 201.163.180.183
Oct 19 03:45:05 hpm sshd\[14763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.180.183
Oct 19 03:45:07 hpm sshd\[14763\]: Failed password for invalid user sysbackup from 201.163.180.183 port 43865 ssh2
Oct 19 03:49:39 hpm sshd\[15122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.180.183  user=root
Oct 19 03:49:41 hpm sshd\[15122\]: Failed password for root from 201.163.180.183 port 34796 ssh2
2019-10-19 22:03:35
49.149.253.205 attackbotsspam
Unauthorized connection attempt from IP address 49.149.253.205 on Port 445(SMB)
2019-10-19 21:56:14
60.250.23.105 attack
SSHScan
2019-10-19 21:56:42
77.40.56.147 attackspambots
Unauthorized connection attempt from IP address 77.40.56.147 on Port 445(SMB)
2019-10-19 22:14:00
111.230.13.11 attack
Oct 19 14:35:07 microserver sshd[12163]: Invalid user zdht_aodun from 111.230.13.11 port 55260
Oct 19 14:35:07 microserver sshd[12163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.13.11
Oct 19 14:35:10 microserver sshd[12163]: Failed password for invalid user zdht_aodun from 111.230.13.11 port 55260 ssh2
Oct 19 14:39:38 microserver sshd[12752]: Invalid user 000000 from 111.230.13.11 port 35078
Oct 19 14:39:38 microserver sshd[12752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.13.11
Oct 19 14:49:51 microserver sshd[14114]: Invalid user 0749108760umbra from 111.230.13.11 port 51246
Oct 19 14:49:51 microserver sshd[14114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.13.11
Oct 19 14:49:52 microserver sshd[14114]: Failed password for invalid user 0749108760umbra from 111.230.13.11 port 51246 ssh2
Oct 19 14:55:11 microserver sshd[15110]: Invalid user Carolina-1
2019-10-19 21:51:48
49.88.112.114 attackspambots
Oct 19 04:04:15 tdfoods sshd\[30406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Oct 19 04:04:17 tdfoods sshd\[30406\]: Failed password for root from 49.88.112.114 port 30852 ssh2
Oct 19 04:05:23 tdfoods sshd\[30497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Oct 19 04:05:25 tdfoods sshd\[30497\]: Failed password for root from 49.88.112.114 port 17946 ssh2
Oct 19 04:08:57 tdfoods sshd\[30764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2019-10-19 22:18:40
185.40.13.155 attackbotsspam
" "
2019-10-19 21:55:42
156.204.181.76 attack
Unauthorized connection attempt from IP address 156.204.181.76 on Port 445(SMB)
2019-10-19 22:18:16
188.120.246.231 attackbotsspam
Mail sent to address hacked/leaked from atari.st
2019-10-19 22:05:40

Recently Reported IPs

86.49.215.202 144.87.145.227 211.254.183.105 5.184.192.93
97.251.244.88 120.229.203.200 79.128.240.133 82.47.209.102
151.168.131.15 250.187.123.77 145.8.132.25 194.153.243.103
190.92.4.61 69.173.40.228 74.214.200.136 249.211.166.91
141.80.231.62 101.38.198.236 42.83.77.36 144.159.123.59