Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.139.73.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.139.73.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 13:51:15 CST 2025
;; MSG SIZE  rcvd: 105
Host info
85.73.139.99.in-addr.arpa domain name pointer 99-139-73-85.lightspeed.snjsca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.73.139.99.in-addr.arpa	name = 99-139-73-85.lightspeed.snjsca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.178.251.146 attack
Automatic report - XMLRPC Attack
2019-10-15 05:24:16
173.249.29.107 attackspam
Fail2Ban Ban Triggered
2019-10-15 05:27:27
194.44.61.133 attack
Oct 14 22:45:11 apollo sshd\[14640\]: Invalid user dexter from 194.44.61.133Oct 14 22:45:13 apollo sshd\[14640\]: Failed password for invalid user dexter from 194.44.61.133 port 36604 ssh2Oct 14 23:06:34 apollo sshd\[14712\]: Failed password for root from 194.44.61.133 port 58574 ssh2
...
2019-10-15 05:09:26
185.147.80.150 attackbotsspam
$f2bV_matches
2019-10-15 05:39:28
167.71.215.72 attackbotsspam
Oct 14 10:43:35 wbs sshd\[23931\]: Invalid user changeme from 167.71.215.72
Oct 14 10:43:35 wbs sshd\[23931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.215.72
Oct 14 10:43:36 wbs sshd\[23931\]: Failed password for invalid user changeme from 167.71.215.72 port 11911 ssh2
Oct 14 10:47:46 wbs sshd\[24263\]: Invalid user derival from 167.71.215.72
Oct 14 10:47:46 wbs sshd\[24263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.215.72
2019-10-15 05:11:27
79.7.206.177 attack
Oct 14 21:57:17 srv206 sshd[29004]: Invalid user jboss from 79.7.206.177
Oct 14 21:57:17 srv206 sshd[29004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host177-206-static.7-79-b.business.telecomitalia.it
Oct 14 21:57:17 srv206 sshd[29004]: Invalid user jboss from 79.7.206.177
Oct 14 21:57:20 srv206 sshd[29004]: Failed password for invalid user jboss from 79.7.206.177 port 57239 ssh2
...
2019-10-15 05:30:07
5.195.233.41 attackbots
Oct 14 21:49:04 rotator sshd\[19616\]: Invalid user cloud from 5.195.233.41Oct 14 21:49:06 rotator sshd\[19616\]: Failed password for invalid user cloud from 5.195.233.41 port 41664 ssh2Oct 14 21:53:15 rotator sshd\[20395\]: Invalid user user from 5.195.233.41Oct 14 21:53:16 rotator sshd\[20395\]: Failed password for invalid user user from 5.195.233.41 port 58012 ssh2Oct 14 21:57:20 rotator sshd\[21199\]: Invalid user river from 5.195.233.41Oct 14 21:57:23 rotator sshd\[21199\]: Failed password for invalid user river from 5.195.233.41 port 45944 ssh2
...
2019-10-15 05:26:53
184.30.210.217 attackbotsspam
10/14/2019-22:53:49.528033 184.30.210.217 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-15 05:12:52
185.62.85.150 attack
ssh failed login
2019-10-15 05:24:42
80.82.70.239 attackspam
firewall-block, port(s): 8640/tcp
2019-10-15 05:44:46
222.186.175.202 attackbotsspam
$f2bV_matches
2019-10-15 05:23:31
86.43.103.111 attackbotsspam
Oct 14 17:28:26 mail sshd\[23427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.43.103.111  user=root
...
2019-10-15 05:40:09
178.153.75.153 attack
" "
2019-10-15 05:28:23
103.83.192.66 attackbotsspam
www.lust-auf-land.com 103.83.192.66 \[14/Oct/2019:21:57:02 +0200\] "POST /wp-login.php HTTP/1.1" 200 5827 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.lust-auf-land.com 103.83.192.66 \[14/Oct/2019:21:57:05 +0200\] "POST /wp-login.php HTTP/1.1" 200 5786 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-15 05:36:45
49.235.137.58 attackspam
Oct 14 11:09:46 auw2 sshd\[21819\]: Invalid user 123QWEasd from 49.235.137.58
Oct 14 11:09:46 auw2 sshd\[21819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.137.58
Oct 14 11:09:48 auw2 sshd\[21819\]: Failed password for invalid user 123QWEasd from 49.235.137.58 port 47010 ssh2
Oct 14 11:14:35 auw2 sshd\[22243\]: Invalid user dixie1 from 49.235.137.58
Oct 14 11:14:35 auw2 sshd\[22243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.137.58
2019-10-15 05:16:59

Recently Reported IPs

47.129.76.197 254.1.64.119 203.175.197.231 221.167.249.51
49.199.254.196 8.145.252.72 160.181.14.72 153.201.206.85
24.97.159.223 95.139.121.201 192.136.94.186 2.160.190.18
93.250.90.48 66.91.85.132 163.40.156.255 89.248.165.83
137.92.193.103 226.213.48.106 50.89.73.141 37.177.31.200