Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lincoln

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.149.217.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28312
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.149.217.45.			IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121201 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 13 04:42:44 CST 2019
;; MSG SIZE  rcvd: 117
Host info
45.217.149.99.in-addr.arpa domain name pointer 99-149-217-45.lightspeed.frokca.sbcglobal.net.
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

Non-authoritative answer:
45.217.149.99.in-addr.arpa	name = 99-149-217-45.lightspeed.frokca.sbcglobal.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
68.183.219.43 attack
Mar 28 05:02:22 vps647732 sshd[10945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.219.43
Mar 28 05:02:25 vps647732 sshd[10945]: Failed password for invalid user rigamonti from 68.183.219.43 port 38470 ssh2
...
2020-03-28 12:04:57
103.108.144.245 attack
Invalid user yufei from 103.108.144.245 port 60725
2020-03-28 09:29:09
104.131.13.199 attackspambots
(sshd) Failed SSH login from 104.131.13.199 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 28 05:42:48 s1 sshd[28142]: Invalid user bnf from 104.131.13.199 port 45100
Mar 28 05:42:50 s1 sshd[28142]: Failed password for invalid user bnf from 104.131.13.199 port 45100 ssh2
Mar 28 05:53:11 s1 sshd[28414]: Invalid user reu from 104.131.13.199 port 33710
Mar 28 05:53:13 s1 sshd[28414]: Failed password for invalid user reu from 104.131.13.199 port 33710 ssh2
Mar 28 05:56:32 s1 sshd[28487]: Invalid user brj from 104.131.13.199 port 46362
2020-03-28 12:07:58
64.227.25.170 attackbots
Invalid user at from 64.227.25.170 port 52678
2020-03-28 09:27:50
93.174.93.171 attackbotsspam
Mar 28 04:55:37 ns3042688 courier-pop3d: LOGIN FAILED, user=office@tienda-dewalt.eu, ip=\[::ffff:93.174.93.171\]
...
2020-03-28 12:09:23
222.138.158.101 attack
Mar 28 04:55:47 debian-2gb-nbg1-2 kernel: \[7626815.758768\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=222.138.158.101 DST=195.201.40.59 LEN=86 TOS=0x00 PREC=0x00 TTL=43 ID=17972 DF PROTO=UDP SPT=1194 DPT=5353 LEN=66
2020-03-28 12:01:59
206.189.137.113 attackspambots
Mar 28 01:55:25 ArkNodeAT sshd\[15182\]: Invalid user usuario from 206.189.137.113
Mar 28 01:55:25 ArkNodeAT sshd\[15182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.137.113
Mar 28 01:55:27 ArkNodeAT sshd\[15182\]: Failed password for invalid user usuario from 206.189.137.113 port 40476 ssh2
2020-03-28 09:23:40
140.249.18.118 attackspam
(sshd) Failed SSH login from 140.249.18.118 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 27 20:54:46 localhost sshd[10042]: Invalid user mdh from 140.249.18.118 port 55830
Mar 27 20:54:49 localhost sshd[10042]: Failed password for invalid user mdh from 140.249.18.118 port 55830 ssh2
Mar 27 21:06:15 localhost sshd[10865]: Invalid user ovk from 140.249.18.118 port 54782
Mar 27 21:06:16 localhost sshd[10865]: Failed password for invalid user ovk from 140.249.18.118 port 54782 ssh2
Mar 27 21:14:35 localhost sshd[11486]: Invalid user jettie from 140.249.18.118 port 35386
2020-03-28 09:31:24
49.235.229.211 attackbotsspam
SSH brute force
2020-03-28 09:16:38
87.251.76.5 attackbots
Mar 27 21:04:33 NPSTNNYC01T sshd[10043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.251.76.5
Mar 27 21:04:35 NPSTNNYC01T sshd[10043]: Failed password for invalid user umi from 87.251.76.5 port 39438 ssh2
Mar 27 21:07:58 NPSTNNYC01T sshd[10362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.251.76.5
...
2020-03-28 09:33:05
96.114.71.147 attackspam
Mar 28 04:56:57 v22018086721571380 sshd[11834]: Failed password for invalid user npr from 96.114.71.147 port 44084 ssh2
Mar 28 05:04:45 v22018086721571380 sshd[13081]: Failed password for invalid user feq from 96.114.71.147 port 52542 ssh2
2020-03-28 12:07:20
180.249.78.125 attackbots
1585367747 - 03/28/2020 04:55:47 Host: 180.249.78.125/180.249.78.125 Port: 445 TCP Blocked
2020-03-28 12:03:03
125.212.217.214 attackspambots
firewall-block, port(s): 5070/tcp
2020-03-28 09:17:49
92.118.38.82 attack
Mar 28 01:13:04 mail postfix/smtpd[25216]: warning: unknown[92.118.38.82]: SASL LOGIN authentication failed: generic failure
Mar 28 01:15:14 mail postfix/smtpd[25216]: warning: unknown[92.118.38.82]: SASL LOGIN authentication failed: generic failure
Mar 28 01:19:11 mail postfix/smtpd[25236]: warning: unknown[92.118.38.82]: SASL LOGIN authentication failed: generic failure
...
2020-03-28 09:29:35
110.77.134.15 attackspam
Mar 18 15:28:52 raspberrypi sshd\[24441\]: Invalid user user from 110.77.134.15Mar 18 15:28:54 raspberrypi sshd\[24441\]: Failed password for invalid user user from 110.77.134.15 port 32816 ssh2Mar 28 00:11:24 raspberrypi sshd\[7127\]: Failed password for root from 110.77.134.15 port 34306 ssh2
...
2020-03-28 09:39:33

Recently Reported IPs

5.133.66.45 79.75.177.132 5.133.66.44 110.89.88.17
97.20.167.19 60.10.24.46 94.181.226.173 132.207.98.50
5.133.66.43 58.131.207.234 37.186.48.130 152.222.196.97
172.63.176.158 5.133.66.41 208.73.118.205 5.133.66.40
88.23.242.20 144.174.1.136 101.77.90.165 191.196.56.150