Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.157.249.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.157.249.138.			IN	A

;; AUTHORITY SECTION:
.			165	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 05:31:36 CST 2022
;; MSG SIZE  rcvd: 107
Host info
138.249.157.99.in-addr.arpa domain name pointer 99-157-249-138.lightspeed.stlsmo.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.249.157.99.in-addr.arpa	name = 99-157-249-138.lightspeed.stlsmo.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.21.64.248 spam
Spammer Website using 104.21.64.248
2022-09-19 03:38:20
167.99.248.252 attack
Sep  3 05:31:57 host sshd[2214]: Failed password for root from 167.99.248.252 port 40276 ssh2
Sep  3 05:31:57 host sshd[2203]: Failed password for root from 167.99.248.252 port 39580 ssh2
Sep  3 05:31:57 host sshd[2179]: Failed password for root from 167.99.248.252 port 38018 ssh2
Sep  3 05:31:57 host sshd[2196]: Failed password for root from 167.99.248.252 port 39254 ssh2
2022-09-05 08:21:45
165.22.88.4 attack
Sep 23 13:27:16 host sshd[1603324]: Failed password for root from 165.22.88.4 port 46180 ssh2
Sep 23 13:27:16 host sshd[1603326]: Failed password for root from 165.22.88.4 port 46182 ssh2
Sep 23 13:27:16 host sshd[1603330]: Failed password for root from 165.22.88.4 port 46184 ssh2
Sep 23 13:27:16 host sshd[1603344]: Failed password for root from 165.22.88.4 port 46186 ssh2
2022-09-24 10:49:53
196.189.91.71 spambotsattackproxynormal
Pms
2022-09-24 13:26:53
192.168.1.100 proxynormal
192.168.1.100
2022-08-29 20:48:19
84.17.43.243 spambotsattack
bot that uses leaked databases for account hijacking
2022-09-11 19:01:48
200.68.159.87 spambotsproxy
Está en dudosa mi privacidad
2022-08-29 19:44:04
45.95.147.10 attack
DDoS
2022-09-12 12:44:10
69.174.169.247 spamattack
ptflixmovies.xyz and icefilms-info.co.uk [69.174.169.247] using host porkbun.com 	44.226.112.151
50.112.189.100
52.34.20.72
2600:1f14:35:3002:948d:d1d2:547b:b1d4
2600:1f14:35:3000:2835:cc1f:b228:9acf
2600:1f14:35:3001:f73c:5020:575:efbc
2022-09-19 03:57:46
82.102.65.127 spamattack
Someone going in my facebook with this ip code. And makeing problems
2022-09-18 19:00:31
50.112.189.100 spamattack
This IP Address using host porkbun.com that never terminate there websites.
2022-09-19 03:54:33
192.168.1.100 proxynormal
192.168.1.100
2022-08-29 20:48:22
77.246.157.191 attack
TROJAN Various Zbot Strains
2022-09-20 12:54:43
192.168.2.55 spambotsattackproxynormal
ho is this ip
2022-09-13 07:36:54
195.178.120.56 attack
DDoS Inbound
2022-09-21 12:32:09

Recently Reported IPs

27.3.209.225 8.10.226.128 125.67.102.112 209.182.251.93
183.126.16.243 170.61.204.254 147.220.252.59 166.37.115.211
86.116.19.71 103.185.216.8 206.254.142.70 33.111.165.62
21.199.180.206 19.220.45.243 217.131.148.141 41.64.122.100
162.88.160.92 230.107.20.76 224.2.121.162 236.42.56.199