Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Thornhill

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.228.150.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5031
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.228.150.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 19:11:23 CST 2025
;; MSG SIZE  rcvd: 107
Host info
130.150.228.99.in-addr.arpa domain name pointer pool-99-228-150-130.cpe.net.cable.rogers.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.150.228.99.in-addr.arpa	name = pool-99-228-150-130.cpe.net.cable.rogers.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.208 attack
2019-09-25T09:19:43.882520abusebot-8.cloudsearch.cf sshd\[27000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208  user=root
2019-09-25 17:42:58
149.202.52.221 attackbots
Automatic report - Banned IP Access
2019-09-25 17:17:35
113.215.58.114 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/113.215.58.114/ 
 CN - 1H : (1998)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN24139 
 
 IP : 113.215.58.114 
 
 CIDR : 113.215.32.0/19 
 
 PREFIX COUNT : 57 
 
 UNIQUE IP COUNT : 524288 
 
 
 WYKRYTE ATAKI Z ASN24139 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-25 17:21:26
91.121.112.93 attack
Sep 25 06:34:07 tux-35-217 sshd\[19442\]: Invalid user x from 91.121.112.93 port 47568
Sep 25 06:34:07 tux-35-217 sshd\[19442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.112.93
Sep 25 06:34:09 tux-35-217 sshd\[19442\]: Failed password for invalid user x from 91.121.112.93 port 47568 ssh2
Sep 25 06:34:58 tux-35-217 sshd\[19455\]: Invalid user x from 91.121.112.93 port 34110
Sep 25 06:34:58 tux-35-217 sshd\[19455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.112.93
...
2019-09-25 17:29:58
185.19.134.121 attackbots
Scanning and Vuln Attempts
2019-09-25 17:09:23
118.98.121.195 attackspambots
Sep 18 14:27:52 vtv3 sshd\[7747\]: Invalid user vcsa from 118.98.121.195 port 59748
Sep 18 14:27:52 vtv3 sshd\[7747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.195
Sep 18 14:27:54 vtv3 sshd\[7747\]: Failed password for invalid user vcsa from 118.98.121.195 port 59748 ssh2
Sep 18 14:32:47 vtv3 sshd\[10412\]: Invalid user student2 from 118.98.121.195 port 45424
Sep 18 14:32:47 vtv3 sshd\[10412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.195
Sep 18 14:47:09 vtv3 sshd\[17976\]: Invalid user admin from 118.98.121.195 port 58918
Sep 18 14:47:09 vtv3 sshd\[17976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.195
Sep 18 14:47:11 vtv3 sshd\[17976\]: Failed password for invalid user admin from 118.98.121.195 port 58918 ssh2
Sep 18 14:52:13 vtv3 sshd\[21518\]: Invalid user webhost from 118.98.121.195 port 44594
Sep 18 14:52:13 vtv3 sshd\[21518
2019-09-25 17:46:19
52.162.161.148 attack
Automatic report - Banned IP Access
2019-09-25 17:21:52
68.183.230.251 attackspam
2019-09-25T04:36:51.8004751495-001 sshd\[35293\]: Failed password for invalid user zh from 68.183.230.251 port 53644 ssh2
2019-09-25T04:46:59.5194671495-001 sshd\[35989\]: Invalid user dwayne from 68.183.230.251 port 10564
2019-09-25T04:46:59.5274651495-001 sshd\[35989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.251
2019-09-25T04:47:01.4853771495-001 sshd\[35989\]: Failed password for invalid user dwayne from 68.183.230.251 port 10564 ssh2
2019-09-25T04:52:11.3667201495-001 sshd\[36433\]: Invalid user testtest from 68.183.230.251 port 53002
2019-09-25T04:52:11.3733781495-001 sshd\[36433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.251
...
2019-09-25 17:15:00
59.52.97.130 attack
[Aegis] @ 2019-09-25 04:49:07  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-09-25 17:36:24
185.179.157.0 attackspam
Scanning and Vuln Attempts
2019-09-25 17:14:37
113.28.150.73 attackbotsspam
Sep 25 08:50:28 DAAP sshd[789]: Invalid user daniel from 113.28.150.73 port 61441
Sep 25 08:50:28 DAAP sshd[789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.28.150.73
Sep 25 08:50:28 DAAP sshd[789]: Invalid user daniel from 113.28.150.73 port 61441
Sep 25 08:50:30 DAAP sshd[789]: Failed password for invalid user daniel from 113.28.150.73 port 61441 ssh2
Sep 25 08:54:35 DAAP sshd[828]: Invalid user packer from 113.28.150.73 port 21185
...
2019-09-25 17:08:05
49.88.112.78 attackbotsspam
SSH bruteforce
2019-09-25 17:16:14
177.101.255.28 attackbots
$f2bV_matches
2019-09-25 17:34:21
117.50.12.10 attackbots
Sep 25 14:21:54 gw1 sshd[14938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.12.10
Sep 25 14:21:56 gw1 sshd[14938]: Failed password for invalid user nancy from 117.50.12.10 port 40452 ssh2
...
2019-09-25 17:31:10
106.13.86.199 attack
Sep 25 11:28:46 plex sshd[30952]: Invalid user admin1 from 106.13.86.199 port 44004
2019-09-25 17:36:39

Recently Reported IPs

16.110.143.229 202.19.232.174 3.148.201.70 220.114.1.160
213.43.70.17 98.80.82.230 137.93.85.233 243.116.102.209
190.142.136.142 88.233.192.162 120.47.90.143 154.57.192.161
188.86.67.105 128.59.89.150 79.145.208.18 90.194.152.75
232.111.185.203 35.212.8.134 15.176.229.93 232.237.14.147