Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Detroit

Region: Michigan

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.14.68.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.14.68.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:50:50 CST 2025
;; MSG SIZE  rcvd: 105
Host info
239.68.14.99.in-addr.arpa domain name pointer 99-14-68-239.lightspeed.livnmi.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.68.14.99.in-addr.arpa	name = 99-14-68-239.lightspeed.livnmi.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.122.1.189 attackspam
1433/tcp
[2019-11-20]1pkt
2019-11-21 04:59:58
118.71.244.45 attack
Unauthorised access (Nov 20) SRC=118.71.244.45 LEN=52 TTL=107 ID=17815 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-21 04:36:07
150.95.212.72 attackspam
Nov 20 15:25:55 ns382633 sshd\[8077\]: Invalid user truman from 150.95.212.72 port 58776
Nov 20 15:25:55 ns382633 sshd\[8077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.212.72
Nov 20 15:25:57 ns382633 sshd\[8077\]: Failed password for invalid user truman from 150.95.212.72 port 58776 ssh2
Nov 20 15:38:45 ns382633 sshd\[10198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.212.72  user=root
Nov 20 15:38:46 ns382633 sshd\[10198\]: Failed password for root from 150.95.212.72 port 46796 ssh2
2019-11-21 04:44:16
91.102.81.121 attackspambots
Automatic report - Port Scan Attack
2019-11-21 04:31:30
74.82.47.14 attackspambots
23/tcp 2323/tcp 548/tcp...
[2019-09-21/11-20]27pkt,15pt.(tcp),1pt.(udp)
2019-11-21 04:40:43
103.70.152.117 attackbotsspam
Unauthorised access (Nov 20) SRC=103.70.152.117 LEN=40 TTL=53 ID=5289 TCP DPT=23 WINDOW=59036 SYN
2019-11-21 05:04:08
52.162.239.76 attackbots
Nov 20 20:01:37 DAAP sshd[27407]: Invalid user fabricius from 52.162.239.76 port 48262
Nov 20 20:01:37 DAAP sshd[27407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.162.239.76
Nov 20 20:01:37 DAAP sshd[27407]: Invalid user fabricius from 52.162.239.76 port 48262
Nov 20 20:01:39 DAAP sshd[27407]: Failed password for invalid user fabricius from 52.162.239.76 port 48262 ssh2
Nov 20 20:05:13 DAAP sshd[27451]: Invalid user debelian from 52.162.239.76 port 59466
...
2019-11-21 04:49:24
183.88.238.209 attack
2019-11-20T20:24:39.682769abusebot-5.cloudsearch.cf sshd\[12254\]: Invalid user mwa from 183.88.238.209 port 59340
2019-11-21 04:39:31
1.172.232.205 attackbotsspam
2323/tcp
[2019-11-20]1pkt
2019-11-21 04:49:54
54.36.54.24 attack
Repeated brute force against a port
2019-11-21 04:38:24
51.77.192.141 attackbotsspam
Nov 20 21:56:16 server sshd\[6160\]: Invalid user yoyo from 51.77.192.141
Nov 20 21:56:16 server sshd\[6160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.ip-51-77-192.eu 
Nov 20 21:56:19 server sshd\[6160\]: Failed password for invalid user yoyo from 51.77.192.141 port 50522 ssh2
Nov 20 22:00:50 server sshd\[7685\]: Invalid user zed from 51.77.192.141
Nov 20 22:00:50 server sshd\[7685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.ip-51-77-192.eu 
...
2019-11-21 05:04:32
51.75.18.215 attackspambots
ssh failed login
2019-11-21 05:01:03
194.54.56.228 attack
8080/tcp 8080/tcp
[2019-10-04/11-20]3pkt
2019-11-21 04:29:44
180.76.245.228 attackspam
Nov 20 18:29:44 XXXXXX sshd[19844]: Invalid user ubnt from 180.76.245.228 port 47694
2019-11-21 04:54:22
104.171.164.197 attack
2019-11-20T16:23:49.374127scmdmz1 sshd\[2857\]: Invalid user krodel from 104.171.164.197 port 56978
2019-11-20T16:23:49.376834scmdmz1 sshd\[2857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.171.164.197
2019-11-20T16:23:51.416290scmdmz1 sshd\[2857\]: Failed password for invalid user krodel from 104.171.164.197 port 56978 ssh2
...
2019-11-21 04:57:29

Recently Reported IPs

145.148.225.60 114.139.159.128 149.141.68.226 204.110.213.13
241.110.123.6 194.61.54.51 252.117.90.151 99.170.96.204
234.126.40.69 78.27.188.124 171.197.156.6 205.12.1.152
95.209.53.239 252.238.17.146 165.162.201.38 126.207.98.219
71.196.147.232 76.82.240.180 200.208.185.91 243.140.10.117