Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Irvine

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.163.14.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31909
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.163.14.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 06 17:37:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
213.14.163.99.in-addr.arpa domain name pointer adsl-99-163-14-213.dsl.irvnca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.14.163.99.in-addr.arpa	name = adsl-99-163-14-213.dsl.irvnca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.193.187.74 attackbots
Unauthorized connection attempt from IP address 113.193.187.74 on Port 445(SMB)
2019-08-13 17:20:41
178.7.8.177 attack
$f2bV_matches
2019-08-13 17:36:29
41.235.46.183 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-08-13 17:29:24
62.76.6.40 attackbotsspam
Aug 13 11:24:05 icinga sshd[20244]: Failed password for postgres from 62.76.6.40 port 41694 ssh2
Aug 13 11:29:09 icinga sshd[20758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.76.6.40
...
2019-08-13 17:42:39
23.129.64.182 attackspam
Aug 13 11:00:48 cp sshd[32237]: Failed password for root from 23.129.64.182 port 22313 ssh2
Aug 13 11:00:52 cp sshd[32237]: Failed password for root from 23.129.64.182 port 22313 ssh2
Aug 13 11:00:54 cp sshd[32237]: Failed password for root from 23.129.64.182 port 22313 ssh2
Aug 13 11:00:56 cp sshd[32237]: Failed password for root from 23.129.64.182 port 22313 ssh2
2019-08-13 17:12:59
77.87.77.55 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-13 17:12:06
196.32.194.90 attack
Invalid user jboss from 196.32.194.90 port 55530
2019-08-13 17:18:12
111.230.241.90 attack
Aug 13 05:37:24 TORMINT sshd\[7355\]: Invalid user raquel from 111.230.241.90
Aug 13 05:37:24 TORMINT sshd\[7355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.241.90
Aug 13 05:37:26 TORMINT sshd\[7355\]: Failed password for invalid user raquel from 111.230.241.90 port 33392 ssh2
...
2019-08-13 17:40:08
49.36.1.111 attackspambots
Unauthorized connection attempt from IP address 49.36.1.111 on Port 445(SMB)
2019-08-13 17:58:15
213.87.130.94 attackbotsspam
dmarc report from: Mail.Ru
[reports:1]
[domains:1]
scam dkim: sendgrid.info
2019-08-13 18:10:49
51.68.177.135 attackspam
Aug 13 10:54:07 root sshd[20417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.177.135 
Aug 13 10:54:09 root sshd[20417]: Failed password for invalid user ftptest from 51.68.177.135 port 33594 ssh2
Aug 13 10:59:42 root sshd[20473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.177.135 
...
2019-08-13 17:57:00
5.122.156.200 attackspambots
Unauthorized connection attempt from IP address 5.122.156.200 on Port 445(SMB)
2019-08-13 17:05:30
110.137.60.242 attack
Unauthorized connection attempt from IP address 110.137.60.242 on Port 445(SMB)
2019-08-13 17:42:02
168.128.13.253 attackspam
Aug 13 11:40:13 lnxmail61 sshd[18011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.13.253
2019-08-13 18:01:45
222.72.140.18 attackspambots
Aug 13 10:34:36 ArkNodeAT sshd\[2653\]: Invalid user farid from 222.72.140.18
Aug 13 10:34:36 ArkNodeAT sshd\[2653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.72.140.18
Aug 13 10:34:38 ArkNodeAT sshd\[2653\]: Failed password for invalid user farid from 222.72.140.18 port 28874 ssh2
2019-08-13 17:44:20

Recently Reported IPs

57.62.42.144 6.156.15.67 201.216.202.117 49.202.140.127
203.254.30.246 38.103.143.89 13.2.18.86 98.78.254.141
23.107.216.128 17.80.109.69 124.248.9.146 14.202.87.62
33.21.45.159 243.210.28.5 140.244.85.224 142.80.146.52
155.21.245.186 141.33.236.128 195.203.131.10 235.47.45.230