Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.169.99.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.169.99.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 17:52:37 CST 2025
;; MSG SIZE  rcvd: 105
Host info
39.99.169.99.in-addr.arpa domain name pointer adsl-99-169-99-39.dsl.bltnin.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.99.169.99.in-addr.arpa	name = adsl-99-169-99-39.dsl.bltnin.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.108.84.89 attackspam
Unauthorised access (Aug 29) SRC=89.108.84.89 LEN=52 TTL=120 ID=30692 DF TCP DPT=1433 WINDOW=8192 SYN
2020-08-30 02:50:38
103.145.12.177 attack
[2020-08-29 13:46:16] NOTICE[1185] chan_sip.c: Registration from '"319" ' failed for '103.145.12.177:5310' - Wrong password
[2020-08-29 13:46:16] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-29T13:46:16.257-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="319",SessionID="0x7f10c4286a78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.177/5310",Challenge="44879013",ReceivedChallenge="44879013",ReceivedHash="de4838cd7fe3144272e59c7d38e2fa70"
[2020-08-29 13:46:16] NOTICE[1185] chan_sip.c: Registration from '"319" ' failed for '103.145.12.177:5310' - Wrong password
[2020-08-29 13:46:16] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-29T13:46:16.374-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="319",SessionID="0x7f10c459e698",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.1
...
2020-08-30 03:15:09
176.59.4.144 attack
1598702693 - 08/29/2020 14:04:53 Host: 176.59.4.144/176.59.4.144 Port: 445 TCP Blocked
2020-08-30 02:51:00
39.101.184.55 attackspam
log:/FCKeditor/editor/filemanager/connectors/php/connector.php
2020-08-30 03:20:02
180.96.63.162 attackbotsspam
2020-08-29T02:29:43.731771hostname sshd[87781]: Failed password for invalid user thiago from 180.96.63.162 port 40160 ssh2
...
2020-08-30 02:59:43
14.225.17.9 attackspam
Aug 29 13:16:54 localhost sshd\[14247\]: Invalid user k from 14.225.17.9 port 39956
Aug 29 13:16:54 localhost sshd\[14247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.17.9
Aug 29 13:16:56 localhost sshd\[14247\]: Failed password for invalid user k from 14.225.17.9 port 39956 ssh2
...
2020-08-30 02:53:11
218.92.0.223 attack
2020-08-29T18:42:16.013260vps1033 sshd[20347]: Failed password for root from 218.92.0.223 port 49579 ssh2
2020-08-29T18:42:20.392409vps1033 sshd[20347]: Failed password for root from 218.92.0.223 port 49579 ssh2
2020-08-29T18:42:23.883147vps1033 sshd[20347]: Failed password for root from 218.92.0.223 port 49579 ssh2
2020-08-29T18:42:27.601318vps1033 sshd[20347]: Failed password for root from 218.92.0.223 port 49579 ssh2
2020-08-29T18:42:31.057286vps1033 sshd[20347]: Failed password for root from 218.92.0.223 port 49579 ssh2
...
2020-08-30 02:48:30
103.237.145.165 attack
xmlrpc attack
2020-08-30 03:01:06
192.241.220.23 attackspam
srv.marc-hoffrichter.de:443 192.241.220.23 - - [29/Aug/2020:14:04:57 +0200] "GET / HTTP/1.1" 403 4817 "-" "Mozilla/5.0 zgrab/0.x"
2020-08-30 02:49:29
95.81.95.77 attackspam
Aug 29 13:03:46 host imapd-ssl: LOGIN FAILED, user=nmas[at][munged], ip=[::ffff:95.81.95.77]
Aug 29 13:03:53 host imapd-ssl: LOGIN FAILED, user=nmas[at][munged], ip=[::ffff:95.81.95.77]
Aug 29 13:04:01 host imapd-ssl: LOGIN FAILED, user=nmas[at][munged], ip=[::ffff:95.81.95.77]
Aug 29 13:04:07 host imapd-ssl: LOGIN FAILED, user=nmas[at][munged], ip=[::ffff:95.81.95.77]
Aug 29 13:04:14 host imapd-ssl: LOGIN FAILED, user=nmas[at][munged], ip=[::ffff:95.81.95.77]
...
2020-08-30 03:19:15
159.203.242.122 attackspam
Port scanning [2 denied]
2020-08-30 03:17:09
51.83.45.65 attackbotsspam
Aug 29 15:09:18 fhem-rasp sshd[6674]: Invalid user naman from 51.83.45.65 port 52716
...
2020-08-30 02:45:56
195.34.243.30 attackspam
Unauthorised access (Aug 29) SRC=195.34.243.30 LEN=52 PREC=0x20 TTL=116 ID=5504 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-30 02:55:59
91.229.112.10 attackspam
[H1.VM4] Blocked by UFW
2020-08-30 03:11:54
112.133.236.20 attackbotsspam
Hacking Attempt (Website Honeypot)
2020-08-30 03:23:43

Recently Reported IPs

162.5.63.138 236.126.227.85 94.117.170.254 120.23.191.143
184.243.162.224 143.127.213.132 248.81.238.24 225.105.38.146
128.43.50.105 240.140.180.57 140.212.208.51 122.10.233.149
211.52.5.43 116.120.187.185 45.158.164.160 128.106.146.62
117.213.250.97 127.94.53.246 177.153.46.5 162.224.223.61