Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.196.38.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.196.38.121.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:31:28 CST 2025
;; MSG SIZE  rcvd: 106
Host info
121.38.196.99.in-addr.arpa domain name pointer 99-196-38-121.cust.exede.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.38.196.99.in-addr.arpa	name = 99-196-38-121.cust.exede.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
62.234.156.66 attackbotsspam
Oct 24 01:53:02 ArkNodeAT sshd\[2135\]: Invalid user beta from 62.234.156.66
Oct 24 01:53:02 ArkNodeAT sshd\[2135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.66
Oct 24 01:53:05 ArkNodeAT sshd\[2135\]: Failed password for invalid user beta from 62.234.156.66 port 34774 ssh2
2019-10-24 07:56:04
114.239.252.146 attackspam
Oct 23 22:12:08 www sshd\[18058\]: Invalid user alexandra from 114.239.252.146 port 50395
...
2019-10-24 07:55:34
51.255.174.215 attackspambots
Invalid user www from 51.255.174.215 port 52074
2019-10-24 08:10:39
49.232.97.184 attackspambots
Oct 21 00:30:10 odroid64 sshd\[23344\]: User root from 49.232.97.184 not allowed because not listed in AllowUsers
Oct 21 00:30:10 odroid64 sshd\[23344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.97.184  user=root
Oct 21 00:30:13 odroid64 sshd\[23344\]: Failed password for invalid user root from 49.232.97.184 port 50464 ssh2
Oct 21 00:30:10 odroid64 sshd\[23344\]: User root from 49.232.97.184 not allowed because not listed in AllowUsers
Oct 21 00:30:10 odroid64 sshd\[23344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.97.184  user=root
Oct 21 00:30:13 odroid64 sshd\[23344\]: Failed password for invalid user root from 49.232.97.184 port 50464 ssh2
...
2019-10-24 08:16:45
46.101.163.220 attackspambots
Invalid user user from 46.101.163.220 port 53089
2019-10-24 08:20:03
172.125.237.100 attackbots
Automatic report - Banned IP Access
2019-10-24 08:01:38
45.55.177.230 attackbotsspam
Invalid user hkitc from 45.55.177.230 port 33870
2019-10-24 08:23:17
46.175.243.9 attack
Oct 21 05:58:03 odroid64 sshd\[5292\]: User root from 46.175.243.9 not allowed because not listed in AllowUsers
Oct 21 05:58:03 odroid64 sshd\[5292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.175.243.9  user=root
Oct 21 05:58:05 odroid64 sshd\[5292\]: Failed password for invalid user root from 46.175.243.9 port 54424 ssh2
Oct 21 05:58:03 odroid64 sshd\[5292\]: User root from 46.175.243.9 not allowed because not listed in AllowUsers
Oct 21 05:58:03 odroid64 sshd\[5292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.175.243.9  user=root
Oct 21 05:58:05 odroid64 sshd\[5292\]: Failed password for invalid user root from 46.175.243.9 port 54424 ssh2
...
2019-10-24 08:17:05
46.101.27.6 attack
Oct 23 09:38:26 XXX sshd[31640]: Invalid user ftpuser from 46.101.27.6 port 34806
2019-10-24 08:19:09
54.37.151.239 attackbotsspam
Oct 24 01:36:09 XXX sshd[59611]: Invalid user ghost from 54.37.151.239 port 60324
2019-10-24 08:05:42
5.196.110.170 attackbots
Invalid user support from 5.196.110.170 port 39538
2019-10-24 08:12:44
177.106.53.209 attackbots
RDP Brute-Force (Grieskirchen RZ2)
2019-10-24 07:57:17
62.219.164.172 attackbots
Automatic report - Banned IP Access
2019-10-24 08:16:24
222.186.175.151 attackspambots
SSH Brute Force, server-1 sshd[11769]: Failed password for root from 222.186.175.151 port 36074 ssh2
2019-10-24 08:11:33
49.247.208.209 attackbotsspam
SSH invalid-user multiple login try
2019-10-24 08:13:22

Recently Reported IPs

104.209.184.190 21.171.152.127 108.46.137.14 119.117.70.122
38.193.253.192 74.6.77.189 7.219.44.145 3.143.199.134
152.63.237.225 226.37.68.158 240.50.235.208 36.66.141.145
118.144.142.61 226.236.220.21 2.30.74.114 234.94.11.246
9.24.17.255 191.61.215.54 248.151.119.103 12.111.168.201