Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Indianapolis

Region: Indiana

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.138.54.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.138.54.241.			IN	A

;; AUTHORITY SECTION:
.			60	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023033000 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 30 16:32:23 CST 2023
;; MSG SIZE  rcvd: 106
Host info
241.54.138.99.in-addr.arpa domain name pointer 99-138-54-241.lightspeed.iplsin.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.54.138.99.in-addr.arpa	name = 99-138-54-241.lightspeed.iplsin.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
173.218.164.39 attackbots
Sep 22 16:46:06 XXX sshd[30162]: reveeclipse mapping checking getaddrinfo for 173-218-164-39.mid.dyn.suddenlink.net [173.218.164.39] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 22 16:46:06 XXX sshd[30162]: Invalid user admin from 173.218.164.39
Sep 22 16:46:06 XXX sshd[30162]: Received disconnect from 173.218.164.39: 11: Bye Bye [preauth]
Sep 22 16:46:07 XXX sshd[30164]: reveeclipse mapping checking getaddrinfo for 173-218-164-39.mid.dyn.suddenlink.net [173.218.164.39] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 22 16:46:07 XXX sshd[30164]: Invalid user admin from 173.218.164.39
Sep 22 16:46:08 XXX sshd[30164]: Received disconnect from 173.218.164.39: 11: Bye Bye [preauth]
Sep 22 16:46:09 XXX sshd[30166]: reveeclipse mapping checking getaddrinfo for 173-218-164-39.mid.dyn.suddenlink.net [173.218.164.39] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 22 16:46:09 XXX sshd[30166]: Invalid user admin from 173.218.164.39
Sep 22 16:46:09 XXX sshd[30166]: Received disconnect from 173.218.164........
-------------------------------
2020-09-23 06:14:47
189.26.221.82 attack
Unauthorized connection attempt from IP address 189.26.221.82 on Port 445(SMB)
2020-09-23 06:17:04
117.211.192.70 attack
Sep 22 23:00:00 ajax sshd[17810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.192.70 
Sep 22 23:00:02 ajax sshd[17810]: Failed password for invalid user adam from 117.211.192.70 port 38876 ssh2
2020-09-23 06:50:12
78.87.195.4 attack
Telnet Server BruteForce Attack
2020-09-23 06:25:21
103.254.198.67 attack
Sep 22 19:03:56 nextcloud sshd\[4059\]: Invalid user dev from 103.254.198.67
Sep 22 19:03:56 nextcloud sshd\[4059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.198.67
Sep 22 19:03:59 nextcloud sshd\[4059\]: Failed password for invalid user dev from 103.254.198.67 port 34018 ssh2
2020-09-23 06:45:15
116.22.198.8 attackbots
Found on   CINS badguys     / proto=6  .  srcport=57685  .  dstport=445  .     (3078)
2020-09-23 06:50:31
134.249.151.4 attackbotsspam
Automatic report - Banned IP Access
2020-09-23 06:28:46
179.27.127.98 attackbots
Unauthorized connection attempt from IP address 179.27.127.98 on Port 445(SMB)
2020-09-23 06:34:47
49.88.112.60 attackbots
Sep 23 01:12:30 baraca inetd[2558]: refused connection from 49.88.112.60, service sshd (tcp)
Sep 23 01:13:36 baraca inetd[2611]: refused connection from 49.88.112.60, service sshd (tcp)
Sep 23 01:14:43 baraca inetd[2637]: refused connection from 49.88.112.60, service sshd (tcp)
...
2020-09-23 06:47:12
171.221.210.158 attackspam
2020-09-22T17:00:42.130420abusebot-7.cloudsearch.cf sshd[7089]: Invalid user alfresco from 171.221.210.158 port 63917
2020-09-22T17:00:42.139316abusebot-7.cloudsearch.cf sshd[7089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.221.210.158
2020-09-22T17:00:42.130420abusebot-7.cloudsearch.cf sshd[7089]: Invalid user alfresco from 171.221.210.158 port 63917
2020-09-22T17:00:44.269593abusebot-7.cloudsearch.cf sshd[7089]: Failed password for invalid user alfresco from 171.221.210.158 port 63917 ssh2
2020-09-22T17:04:02.548030abusebot-7.cloudsearch.cf sshd[7108]: Invalid user pedro from 171.221.210.158 port 17262
2020-09-22T17:04:02.556458abusebot-7.cloudsearch.cf sshd[7108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.221.210.158
2020-09-22T17:04:02.548030abusebot-7.cloudsearch.cf sshd[7108]: Invalid user pedro from 171.221.210.158 port 17262
2020-09-22T17:04:04.476011abusebot-7.cloudsearch.cf ssh
...
2020-09-23 06:38:54
114.67.87.218 attackspam
Found on   Github Combined on 3 lists    / proto=6  .  srcport=47522  .  dstport=29713  .     (3081)
2020-09-23 06:13:43
94.139.182.10 attack
Unauthorized connection attempt from IP address 94.139.182.10 on Port 445(SMB)
2020-09-23 06:46:47
118.89.241.214 attackspam
[f2b] sshd bruteforce, retries: 1
2020-09-23 06:42:43
54.36.163.141 attack
SSH Brute Force
2020-09-23 06:25:44
174.235.10.247 attackbots
Brute forcing email accounts
2020-09-23 06:45:58

Recently Reported IPs

91.246.198.34 84.237.149.118 46.180.219.86 170.85.199.65
189.234.118.209 150.5.116.58 215.246.211.255 86.22.74.84
34.230.191.45 47.26.253.41 221.98.180.157 54.64.51.73
221.67.162.248 187.149.135.132 29.3.36.126 187.98.118.197
201.171.104.237 199.123.250.236 103.148.121.14 99.103.177.209