Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.21.98.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.21.98.213.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032301 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 05:26:23 CST 2020
;; MSG SIZE  rcvd: 116
Host info
213.98.21.99.in-addr.arpa domain name pointer adsl-99-21-98-213.dsl.sndg02.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.98.21.99.in-addr.arpa	name = adsl-99-21-98-213.dsl.sndg02.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.37.156.188 attackspambots
Aug  7 14:52:35 TORMINT sshd\[10348\]: Invalid user wxl from 54.37.156.188
Aug  7 14:52:35 TORMINT sshd\[10348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.156.188
Aug  7 14:52:37 TORMINT sshd\[10348\]: Failed password for invalid user wxl from 54.37.156.188 port 35848 ssh2
...
2019-08-08 02:53:10
185.70.187.223 attack
185.70.187.223  


ISP
Hostkey B.V.  

Usage Type
Data Center/Web Hosting/Transit  

Hostname(s)
from.smartana.net 
 

Domain Name
hostkey.com  

Country
 Netherlands  

City
Amsterdam, Noord-Holland
2019-08-08 02:25:19
178.62.244.194 attackspambots
Aug  7 17:40:10 MK-Soft-VM7 sshd\[8158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.244.194  user=root
Aug  7 17:40:13 MK-Soft-VM7 sshd\[8158\]: Failed password for root from 178.62.244.194 port 42190 ssh2
Aug  7 17:46:01 MK-Soft-VM7 sshd\[8227\]: Invalid user marcia from 178.62.244.194 port 39150
Aug  7 17:46:01 MK-Soft-VM7 sshd\[8227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.244.194
...
2019-08-08 02:32:39
178.128.55.52 attackbotsspam
Aug  7 19:45:07 vpn01 sshd\[8948\]: Invalid user mailroom from 178.128.55.52
Aug  7 19:45:07 vpn01 sshd\[8948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.52
Aug  7 19:45:09 vpn01 sshd\[8948\]: Failed password for invalid user mailroom from 178.128.55.52 port 48657 ssh2
2019-08-08 02:56:22
101.89.95.77 attack
Aug  7 20:03:17 debian sshd\[11791\]: Invalid user abc from 101.89.95.77 port 43558
Aug  7 20:03:17 debian sshd\[11791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.95.77
...
2019-08-08 03:22:13
218.92.0.175 attackbotsspam
2019-08-07T18:45:37.184789+01:00 suse sshd[8775]: User root from 218.92.0.175 not allowed because not listed in AllowUsers
2019-08-07T18:45:39.820903+01:00 suse sshd[8775]: error: PAM: Authentication failure for illegal user root from 218.92.0.175
2019-08-07T18:45:37.184789+01:00 suse sshd[8775]: User root from 218.92.0.175 not allowed because not listed in AllowUsers
2019-08-07T18:45:39.820903+01:00 suse sshd[8775]: error: PAM: Authentication failure for illegal user root from 218.92.0.175
2019-08-07T18:45:37.184789+01:00 suse sshd[8775]: User root from 218.92.0.175 not allowed because not listed in AllowUsers
2019-08-07T18:45:39.820903+01:00 suse sshd[8775]: error: PAM: Authentication failure for illegal user root from 218.92.0.175
2019-08-07T18:45:39.823269+01:00 suse sshd[8775]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.175 port 34870 ssh2
...
2019-08-08 02:43:39
202.80.219.120 attack
Wordpress attack
2019-08-08 02:54:31
157.55.39.54 attackbotsspam
Automatic report - Banned IP Access
2019-08-08 02:33:05
1.217.98.44 attackspambots
Aug  7 13:30:13 aat-srv002 sshd[15179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.217.98.44
Aug  7 13:30:15 aat-srv002 sshd[15179]: Failed password for invalid user support from 1.217.98.44 port 55810 ssh2
Aug  7 13:35:00 aat-srv002 sshd[15286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.217.98.44
Aug  7 13:35:03 aat-srv002 sshd[15286]: Failed password for invalid user hdfs from 1.217.98.44 port 49244 ssh2
...
2019-08-08 02:38:54
120.52.96.216 attack
Jun 20 02:26:03 vtv3 sshd\[2536\]: Invalid user test from 120.52.96.216 port 18760
Jun 20 02:26:03 vtv3 sshd\[2536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.96.216
Jun 20 02:26:05 vtv3 sshd\[2536\]: Failed password for invalid user test from 120.52.96.216 port 18760 ssh2
Jun 20 02:31:10 vtv3 sshd\[5036\]: Invalid user l4d2 from 120.52.96.216 port 38354
Jun 20 02:31:10 vtv3 sshd\[5036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.96.216
Jun 20 02:41:58 vtv3 sshd\[10176\]: Invalid user gta from 120.52.96.216 port 22370
Jun 20 02:41:58 vtv3 sshd\[10176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.96.216
Jun 20 02:42:00 vtv3 sshd\[10176\]: Failed password for invalid user gta from 120.52.96.216 port 22370 ssh2
Jun 20 02:43:32 vtv3 sshd\[10792\]: Invalid user testftp from 120.52.96.216 port 28127
Jun 20 02:43:32 vtv3 sshd\[10792\]: pam_unix\(sshd:
2019-08-08 03:17:03
95.74.245.166 attackspam
Aug719:43:25server2dovecot:imap-login:Disconnected\(authfailed\,1attemptsin2secs\):user=\\,method=PLAIN\,rip=95.74.245.166\,lip=136.243.224.50\,TLS\,session=\Aug719:43:35server2dovecot:imap-login:Disconnected\(authfailed\,1attemptsin6secs\):user=\\,method=PLAIN\,rip=95.74.245.166\,lip=136.243.224.50\,TLS\,session=\Aug719:43:42server2dovecot:imap-login:Disconnected\(authfailed\,1attemptsin6secs\):user=\\,method=PLAIN\,rip=95.74.245.166\,lip=136.243.224.50\,TLS\,session=\Aug719:43:47server2dovecot:imap-login:Disconnected\(authfailed\,1attemptsin2secs\):user=\\,method=PLAIN\,rip=95.74.245.166\,lip=136.243.224.50\,TLS\,session=\Aug719:43:53server2dovecot:imap-login:Disconnected\(authfailed\,1attemptsin2secs\):user=\\,method=PLAIN\,rip=95.74.245.166\,lip=136.243.224.50\,TLS\,session
2019-08-08 03:15:10
211.118.42.251 attackbots
Aug  7 17:41:21 ip-172-31-1-72 sshd\[7627\]: Invalid user jenkins from 211.118.42.251
Aug  7 17:41:21 ip-172-31-1-72 sshd\[7627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.118.42.251
Aug  7 17:41:22 ip-172-31-1-72 sshd\[7627\]: Failed password for invalid user jenkins from 211.118.42.251 port 26260 ssh2
Aug  7 17:45:46 ip-172-31-1-72 sshd\[7715\]: Invalid user candy from 211.118.42.251
Aug  7 17:45:46 ip-172-31-1-72 sshd\[7715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.118.42.251
2019-08-08 02:31:45
206.189.72.217 attack
Automatic report - Banned IP Access
2019-08-08 02:20:57
104.140.188.50 attackbotsspam
Automatic report - Port Scan Attack
2019-08-08 03:10:10
150.254.123.96 attackbotsspam
2019-08-07T19:44:12.3009461240 sshd\[23029\]: Invalid user beehive from 150.254.123.96 port 33460
2019-08-07T19:44:12.3061951240 sshd\[23029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.254.123.96
2019-08-07T19:44:14.4176841240 sshd\[23029\]: Failed password for invalid user beehive from 150.254.123.96 port 33460 ssh2
...
2019-08-08 03:16:29

Recently Reported IPs

218.42.184.239 122.27.115.79 166.209.19.180 212.211.138.129
104.35.22.128 105.220.74.71 177.254.55.182 47.139.74.129
90.162.110.114 82.248.68.220 105.109.48.40 75.55.232.33
166.88.107.200 213.101.39.9 40.108.235.40 203.129.194.42
191.50.102.181 220.40.186.146 70.160.21.58 170.81.202.76