Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.149.224.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.149.224.80.			IN	A

;; AUTHORITY SECTION:
.			132	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020300 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 03 20:52:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 80.224.149.99.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.82.98, trying next server
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.224.149.99.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
128.199.182.235 attackspambots
2019-07-05T03:14:03.611382abusebot-4.cloudsearch.cf sshd\[10960\]: Invalid user simon from 128.199.182.235 port 56710
2019-07-05 12:20:08
112.85.42.185 attackspam
Jul  5 04:02:24 MK-Soft-VM5 sshd\[19157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185  user=root
Jul  5 04:02:26 MK-Soft-VM5 sshd\[19157\]: Failed password for root from 112.85.42.185 port 22657 ssh2
Jul  5 04:02:28 MK-Soft-VM5 sshd\[19157\]: Failed password for root from 112.85.42.185 port 22657 ssh2
...
2019-07-05 12:10:08
52.247.219.222 attackbotsspam
3389BruteforceIDS
2019-07-05 12:19:08
118.24.143.110 attack
SSH Brute-Force reported by Fail2Ban
2019-07-05 12:27:47
45.65.220.171 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-04 21:18:51,075 INFO [amun_request_handler] PortScan Detected on Port: 445 (45.65.220.171)
2019-07-05 11:55:04
36.5.182.67 attackspam
Bad bot requested remote resources
2019-07-05 12:38:05
142.93.15.179 attackbotsspam
Jul  5 06:07:06 pornomens sshd\[30171\]: Invalid user marlon from 142.93.15.179 port 60804
Jul  5 06:07:06 pornomens sshd\[30171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.15.179
Jul  5 06:07:08 pornomens sshd\[30171\]: Failed password for invalid user marlon from 142.93.15.179 port 60804 ssh2
...
2019-07-05 12:14:48
105.112.104.250 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 15:23:58,653 INFO [shellcode_manager] (105.112.104.250) no match, writing hexdump (bf8b1de65bed17a680c8ba5e419457ec :2437696) - MS17010 (EternalBlue)
2019-07-05 12:14:12
187.37.103.239 attackspam
Automatic report - SSH Brute-Force Attack
2019-07-05 12:32:52
190.15.203.153 attack
Jul  5 02:32:32 ip-172-31-1-72 sshd\[15453\]: Invalid user temp from 190.15.203.153
Jul  5 02:32:32 ip-172-31-1-72 sshd\[15453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.15.203.153
Jul  5 02:32:33 ip-172-31-1-72 sshd\[15453\]: Failed password for invalid user temp from 190.15.203.153 port 51080 ssh2
Jul  5 02:35:27 ip-172-31-1-72 sshd\[15499\]: Invalid user user1 from 190.15.203.153
Jul  5 02:35:27 ip-172-31-1-72 sshd\[15499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.15.203.153
2019-07-05 11:57:36
178.128.21.45 attackspam
Jul  4 22:03:22 aat-srv002 sshd[22809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.45
Jul  4 22:03:24 aat-srv002 sshd[22809]: Failed password for invalid user nmrh from 178.128.21.45 port 36477 ssh2
Jul  4 22:05:55 aat-srv002 sshd[22836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.45
Jul  4 22:05:57 aat-srv002 sshd[22836]: Failed password for invalid user devserver from 178.128.21.45 port 48776 ssh2
...
2019-07-05 12:31:44
54.38.33.186 attackbotsspam
Jul  5 02:47:55 ip-172-31-62-245 sshd\[15526\]: Failed password for ubuntu from 54.38.33.186 port 35396 ssh2\
Jul  5 02:50:04 ip-172-31-62-245 sshd\[15529\]: Invalid user invoices from 54.38.33.186\
Jul  5 02:50:07 ip-172-31-62-245 sshd\[15529\]: Failed password for invalid user invoices from 54.38.33.186 port 60796 ssh2\
Jul  5 02:52:17 ip-172-31-62-245 sshd\[15535\]: Invalid user admin from 54.38.33.186\
Jul  5 02:52:18 ip-172-31-62-245 sshd\[15535\]: Failed password for invalid user admin from 54.38.33.186 port 57962 ssh2\
2019-07-05 12:32:30
34.238.190.130 attackspambots
Jul  4 22:48:14   TCP Attack: SRC=34.238.190.130 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=235  DF PROTO=TCP SPT=59294 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0
2019-07-05 12:47:27
104.128.69.146 attack
Jul  5 02:49:39 cvbmail sshd\[8715\]: Invalid user oracles from 104.128.69.146
Jul  5 02:49:39 cvbmail sshd\[8715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.69.146
Jul  5 02:49:41 cvbmail sshd\[8715\]: Failed password for invalid user oracles from 104.128.69.146 port 39831 ssh2
2019-07-05 11:56:06
14.177.199.195 attack
Jul  5 00:48:31 dev sshd\[21227\]: Invalid user admin from 14.177.199.195 port 53871
Jul  5 00:48:31 dev sshd\[21227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.177.199.195
...
2019-07-05 12:34:35

Recently Reported IPs

165.70.116.60 20.98.200.234 185.98.56.39 145.72.27.73
170.64.247.178 129.55.187.78 212.70.151.154 159.160.183.246
164.22.137.26 129.36.242.180 26.151.147.110 201.88.68.25
103.130.213.29 212.100.70.36 45.136.231.39 184.86.96.250
104.51.24.217 120.139.92.0 51.40.158.34 29.44.155.77