Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       99.208.0.0 - 99.223.255.255
CIDR:           99.208.0.0/12
NetName:        ROGERS-COM-DPS
NetHandle:      NET-99-208-0-0-1
Parent:         NET99 (NET-99-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Rogers Communications Canada Inc. (RCC-182)
RegDate:        2007-03-12
Updated:        2017-01-06
Ref:            https://rdap.arin.net/registry/ip/99.208.0.0



OrgName:        Rogers Communications Canada Inc.
OrgId:          RCC-182
Address:        333 Bloor Street East 
Address:        9th Floor
City:           Toronto
StateProv:      ON
PostalCode:     M4W 1G9
Country:        CA
RegDate:        2016-10-20
Updated:        2025-09-19
Ref:            https://rdap.arin.net/registry/entity/RCC-182


OrgAbuseHandle: MCKIB27-ARIN
OrgAbuseName:   Mckibbon, Peter 
OrgAbusePhone:  +1-416-268-7454 
OrgAbuseEmail:  abuse@rogers.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MCKIB27-ARIN

OrgTechHandle: BAKOG1-ARIN
OrgTechName:   Bakogiannis, Labros 
OrgTechPhone:  +1-647-747-1056 
OrgTechEmail:  labros.bakogiannis@rci.rogers.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BAKOG1-ARIN

OrgTechHandle: LEEJE40-ARIN
OrgTechName:   Lee, Jeffrey 
OrgTechPhone:  +1-416-903-9230 
OrgTechEmail:  Jeffrey.Lee@rci.rogers.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LEEJE40-ARIN

OrgTechHandle: IPMAN-ARIN
OrgTechName:   IP MANAGE
OrgTechPhone:  +1-647-747-3294 
OrgTechEmail:  ipmanage@rogers.wave.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/IPMAN-ARIN

# end


# start

NetRange:       99.219.142.0 - 99.219.143.255
CIDR:           99.219.142.0/23
NetName:        DPS
NetHandle:      NET-99-219-142-0-1
Parent:         ROGERS-COM-DPS (NET-99-208-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Rogers Cable Inc. YM (C02140360)
RegDate:        2009-01-22
Updated:        2009-01-22
Ref:            https://rdap.arin.net/registry/ip/99.219.142.0


CustName:       Rogers Cable Inc. YM
Address:        1 Mount Pleasant Road
City:           Toronto
StateProv:      ON
PostalCode:     M4Y-2Y5
Country:        CA
RegDate:        2009-01-22
Updated:        2017-01-06
Ref:            https://rdap.arin.net/registry/entity/C02140360

OrgAbuseHandle: MCKIB27-ARIN
OrgAbuseName:   Mckibbon, Peter 
OrgAbusePhone:  +1-416-268-7454 
OrgAbuseEmail:  abuse@rogers.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MCKIB27-ARIN

OrgTechHandle: BAKOG1-ARIN
OrgTechName:   Bakogiannis, Labros 
OrgTechPhone:  +1-647-747-1056 
OrgTechEmail:  labros.bakogiannis@rci.rogers.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BAKOG1-ARIN

OrgTechHandle: LEEJE40-ARIN
OrgTechName:   Lee, Jeffrey 
OrgTechPhone:  +1-416-903-9230 
OrgTechEmail:  Jeffrey.Lee@rci.rogers.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LEEJE40-ARIN

OrgTechHandle: IPMAN-ARIN
OrgTechName:   IP MANAGE
OrgTechPhone:  +1-647-747-3294 
OrgTechEmail:  ipmanage@rogers.wave.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/IPMAN-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.219.142.176
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51127
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.219.142.176.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025111000 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 10 14:34:01 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 176.142.219.99.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 176.142.219.99.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.70.28.112 attackbotsspam
st-nyc1-01 recorded 3 login violations from 148.70.28.112 and was blocked at 2019-10-30 21:23:32. 148.70.28.112 has been blocked on 8 previous occasions. 148.70.28.112's first attempt was recorded at 2019-10-30 18:09:50
2019-10-31 05:30:44
118.25.133.121 attackspam
Oct 30 21:29:00 cavern sshd[27180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.133.121
2019-10-31 05:15:41
10.10.20.56 attackspambots
Blocked
2019-10-31 05:49:48
46.38.144.202 attackspambots
2019-10-30T22:13:46.151701mail01 postfix/smtpd[14113]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T22:13:48.154015mail01 postfix/smtpd[14164]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T22:14:05.424624mail01 postfix/smtpd[14113]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-31 05:33:09
2001:41d0:2:af56:: attackbots
xmlrpc attack
2019-10-31 05:28:58
78.181.196.10 attackbots
Chat Spam
2019-10-31 05:12:05
51.75.160.215 attackbotsspam
Oct 30 22:30:41 MK-Soft-VM3 sshd[2279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215 
Oct 30 22:30:43 MK-Soft-VM3 sshd[2279]: Failed password for invalid user pi from 51.75.160.215 port 38010 ssh2
...
2019-10-31 05:37:47
46.185.116.180 attack
Automatic report - Banned IP Access
2019-10-31 05:12:36
213.32.91.71 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-10-31 05:39:03
113.109.245.151 attackbotsspam
2019-10-30T20:59:11.671338abusebot-5.cloudsearch.cf sshd\[21601\]: Invalid user gong from 113.109.245.151 port 48853
2019-10-31 05:23:14
193.112.241.141 attackbots
Oct 30 21:57:13 srv01 sshd[13583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.241.141  user=root
Oct 30 21:57:14 srv01 sshd[13583]: Failed password for root from 193.112.241.141 port 47188 ssh2
Oct 30 22:01:19 srv01 sshd[13797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.241.141  user=root
Oct 30 22:01:21 srv01 sshd[13797]: Failed password for root from 193.112.241.141 port 57258 ssh2
Oct 30 22:05:27 srv01 sshd[14027]: Invalid user intranet from 193.112.241.141
...
2019-10-31 05:20:15
117.121.214.50 attackbotsspam
2019-10-30T21:02:48.583268abusebot-2.cloudsearch.cf sshd\[10222\]: Invalid user nas from 117.121.214.50 port 49826
2019-10-31 05:32:25
197.234.144.21 attackbotsspam
Telnetd brute force attack detected by fail2ban
2019-10-31 05:15:13
191.252.218.46 attackspam
Lines containing failures of 191.252.218.46
auth.log:Oct 30 21:19:14 omfg sshd[14062]: Connection from 191.252.218.46 port 59980 on 78.46.60.42 port 22
auth.log:Oct 30 21:19:14 omfg sshd[14062]: Did not receive identification string from 191.252.218.46
auth.log:Oct 30 21:20:13 omfg sshd[15047]: Connection from 191.252.218.46 port 33462 on 78.46.60.42 port 22
auth.log:Oct 30 21:20:15 omfg sshd[15047]: Invalid user samp from 191.252.218.46
auth.log:Oct 30 21:20:15 omfg sshd[15047]: Received disconnect from 191.252.218.46 port 33462:11: Normal Shutdown, Thank you for playing [preauth]
auth.log:Oct 30 21:20:15 omfg sshd[15047]: Disconnected from 191.252.218.46 port 33462 [preauth]
auth.log:Oct 30 21:20:38 omfg sshd[15212]: Connection from 191.252.218.46 port 38016 on 78.46.60.42 port 22
auth.log:Oct 30 21:20:40 omfg sshd[15212]: Invalid user dkan from 191.252.218.46
auth.log:Oct 30 21:20:40 omfg sshd[15212]: Received disconnect from 191.252.218.46 port 38016:11: Normal Shutd........
------------------------------
2019-10-31 05:45:22
222.186.180.9 attack
Oct 30 22:17:03 dedicated sshd[23792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Oct 30 22:17:05 dedicated sshd[23792]: Failed password for root from 222.186.180.9 port 29276 ssh2
2019-10-31 05:22:19

Recently Reported IPs

116.179.37.227 10.50.111.235 172.20.2.2 172.20.2.1
157.175.76.105 170.64.173.170 162.216.150.179 183.82.110.60
20.29.19.106 172.18.64.1 221.0.199.123 66.90.98.179
104.238.222.173 36.139.241.99 18.97.19.170 10.110.73.8
93.44.44.183 10.17.133.248 111.49.8.210 167.71.228.124