Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tehachapi

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.159.21.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.159.21.99.			IN	A

;; AUTHORITY SECTION:
.			484	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081601 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 17 08:31:19 CST 2020
;; MSG SIZE  rcvd: 116
Host info
99.21.159.99.in-addr.arpa domain name pointer 99-159-21-99.lightspeed.bkfdca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.21.159.99.in-addr.arpa	name = 99-159-21-99.lightspeed.bkfdca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.112.58.212 attack
Oct 14 02:02:18 auw2 sshd\[4043\]: Invalid user Montecarlo-123 from 193.112.58.212
Oct 14 02:02:18 auw2 sshd\[4043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.58.212
Oct 14 02:02:19 auw2 sshd\[4043\]: Failed password for invalid user Montecarlo-123 from 193.112.58.212 port 41386 ssh2
Oct 14 02:07:35 auw2 sshd\[4563\]: Invalid user P@sswordxxx from 193.112.58.212
Oct 14 02:07:35 auw2 sshd\[4563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.58.212
2019-10-14 22:06:48
106.12.210.229 attackspambots
Oct 14 15:46:20 eventyay sshd[32260]: Failed password for root from 106.12.210.229 port 58438 ssh2
Oct 14 15:52:05 eventyay sshd[32361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.210.229
Oct 14 15:52:07 eventyay sshd[32361]: Failed password for invalid user ftpuser from 106.12.210.229 port 39232 ssh2
...
2019-10-14 22:12:32
206.81.7.42 attackspam
Oct 14 03:49:27 kapalua sshd\[25899\]: Invalid user 123ewqasd from 206.81.7.42
Oct 14 03:49:27 kapalua sshd\[25899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.7.42
Oct 14 03:49:29 kapalua sshd\[25899\]: Failed password for invalid user 123ewqasd from 206.81.7.42 port 34184 ssh2
Oct 14 03:52:56 kapalua sshd\[26156\]: Invalid user Vodka123 from 206.81.7.42
Oct 14 03:52:56 kapalua sshd\[26156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.7.42
2019-10-14 22:10:02
37.146.210.163 attackspam
Oct 14 15:17:16 ncomp sshd[28217]: Invalid user ubnt from 37.146.210.163
Oct 14 15:17:16 ncomp sshd[28217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.146.210.163
Oct 14 15:17:16 ncomp sshd[28217]: Invalid user ubnt from 37.146.210.163
Oct 14 15:17:18 ncomp sshd[28217]: Failed password for invalid user ubnt from 37.146.210.163 port 49097 ssh2
2019-10-14 21:55:08
125.212.212.226 attackbots
Oct 14 14:55:12 bouncer sshd\[15080\]: Invalid user 2wsx3edc from 125.212.212.226 port 55156
Oct 14 14:55:12 bouncer sshd\[15080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.212.226 
Oct 14 14:55:14 bouncer sshd\[15080\]: Failed password for invalid user 2wsx3edc from 125.212.212.226 port 55156 ssh2
...
2019-10-14 21:45:05
82.196.14.222 attackspam
$f2bV_matches
2019-10-14 21:49:22
51.75.17.228 attackspam
Oct 14 13:44:38 SilenceServices sshd[30904]: Failed password for root from 51.75.17.228 port 59570 ssh2
Oct 14 13:48:27 SilenceServices sshd[31943]: Failed password for root from 51.75.17.228 port 51152 ssh2
2019-10-14 22:04:16
202.29.51.126 attackspam
2019-10-14T11:51:46.252537abusebot-5.cloudsearch.cf sshd\[21870\]: Invalid user Transport1@3 from 202.29.51.126 port 58931
2019-10-14 22:18:29
98.156.148.239 attackspambots
Oct 14 13:52:20 host sshd\[33897\]: Invalid user Santos_123 from 98.156.148.239 port 33122
Oct 14 13:52:20 host sshd\[33897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.156.148.239
...
2019-10-14 21:59:43
91.121.211.59 attack
Oct 14 02:03:31 sachi sshd\[3553\]: Invalid user SOLEIL!23 from 91.121.211.59
Oct 14 02:03:31 sachi sshd\[3553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu
Oct 14 02:03:32 sachi sshd\[3553\]: Failed password for invalid user SOLEIL!23 from 91.121.211.59 port 36324 ssh2
Oct 14 02:07:23 sachi sshd\[3847\]: Invalid user Asdf!@\# from 91.121.211.59
Oct 14 02:07:23 sachi sshd\[3847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu
2019-10-14 22:10:35
176.31.253.55 attackbotsspam
Oct 14 13:45:27 SilenceServices sshd[31143]: Failed password for root from 176.31.253.55 port 54256 ssh2
Oct 14 13:49:22 SilenceServices sshd[32193]: Failed password for root from 176.31.253.55 port 37656 ssh2
2019-10-14 21:44:15
91.134.135.220 attack
Oct 14 15:27:12 SilenceServices sshd[26698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.135.220
Oct 14 15:27:14 SilenceServices sshd[26698]: Failed password for invalid user Vodka123 from 91.134.135.220 port 44886 ssh2
Oct 14 15:31:06 SilenceServices sshd[27767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.135.220
2019-10-14 22:25:38
106.13.6.116 attackbots
Oct 14 13:23:46 unicornsoft sshd\[29591\]: User root from 106.13.6.116 not allowed because not listed in AllowUsers
Oct 14 13:23:46 unicornsoft sshd\[29591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116  user=root
Oct 14 13:23:48 unicornsoft sshd\[29591\]: Failed password for invalid user root from 106.13.6.116 port 34906 ssh2
2019-10-14 22:13:54
132.232.132.103 attackspambots
Oct 14 13:46:08 MainVPS sshd[27619]: Invalid user Auto2017 from 132.232.132.103 port 41828
Oct 14 13:46:08 MainVPS sshd[27619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.132.103
Oct 14 13:46:08 MainVPS sshd[27619]: Invalid user Auto2017 from 132.232.132.103 port 41828
Oct 14 13:46:10 MainVPS sshd[27619]: Failed password for invalid user Auto2017 from 132.232.132.103 port 41828 ssh2
Oct 14 13:51:42 MainVPS sshd[27993]: Invalid user 4rfvbgt56yhn from 132.232.132.103 port 52168
...
2019-10-14 22:20:20
46.229.168.141 attackbots
Unauthorized access detected from banned ip
2019-10-14 22:09:10

Recently Reported IPs

201.212.203.242 61.82.65.129 99.38.112.164 87.222.54.237
154.137.76.120 108.112.235.20 73.32.195.136 124.98.124.239
117.213.27.53 203.170.245.91 78.128.159.15 92.33.250.71
46.49.235.108 72.20.134.168 77.112.105.182 206.106.45.219
188.234.171.189 176.107.8.26 118.185.22.121 202.126.236.92