Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.243.154.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29373
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.243.154.136.			IN	A

;; AUTHORITY SECTION:
.			138	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:27:43 CST 2022
;; MSG SIZE  rcvd: 107
Host info
136.154.243.99.in-addr.arpa domain name pointer cpe5c7695bc7b23-cm5c7695bc7b21.cpe.net.cable.rogers.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.154.243.99.in-addr.arpa	name = cpe5c7695bc7b23-cm5c7695bc7b21.cpe.net.cable.rogers.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.3.177.213 attack
ssh failed login
2019-09-01 12:27:36
164.132.24.138 attackbots
2019-09-01T00:18:31.393890wiz-ks3 sshd[4457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.24.138  user=root
2019-09-01T00:18:33.203896wiz-ks3 sshd[4457]: Failed password for root from 164.132.24.138 port 36066 ssh2
2019-09-01T00:30:46.643845wiz-ks3 sshd[4485]: Invalid user spice from 164.132.24.138 port 34165
2019-09-01T00:30:46.645911wiz-ks3 sshd[4485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.24.138
2019-09-01T00:30:46.643845wiz-ks3 sshd[4485]: Invalid user spice from 164.132.24.138 port 34165
2019-09-01T00:30:48.355864wiz-ks3 sshd[4485]: Failed password for invalid user spice from 164.132.24.138 port 34165 ssh2
2019-09-01T00:39:52.907781wiz-ks3 sshd[4509]: Invalid user git from 164.132.24.138 port 57239
2019-09-01T00:39:52.909857wiz-ks3 sshd[4509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.24.138
2019-09-01T00:39:52.907781wiz-ks3 sshd[4509]: Invali
2019-09-01 11:49:35
81.22.45.219 attackbotsspam
08/31/2019-22:47:53.600517 81.22.45.219 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-01 11:54:37
91.214.146.100 attackspam
[portscan] Port scan
2019-09-01 11:44:20
86.242.39.179 attackbotsspam
Aug 31 23:42:08 minden010 sshd[18910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.242.39.179
Aug 31 23:42:10 minden010 sshd[18910]: Failed password for invalid user huai from 86.242.39.179 port 36736 ssh2
Aug 31 23:46:01 minden010 sshd[20261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.242.39.179
...
2019-09-01 12:03:24
188.166.152.106 attackspam
Aug 31 20:46:25 Tower sshd[31702]: Connection from 188.166.152.106 port 59110 on 192.168.10.220 port 22
Aug 31 20:46:26 Tower sshd[31702]: Invalid user Dakota from 188.166.152.106 port 59110
Aug 31 20:46:26 Tower sshd[31702]: error: Could not get shadow information for NOUSER
Aug 31 20:46:26 Tower sshd[31702]: Failed password for invalid user Dakota from 188.166.152.106 port 59110 ssh2
Aug 31 20:46:26 Tower sshd[31702]: Received disconnect from 188.166.152.106 port 59110:11: Bye Bye [preauth]
Aug 31 20:46:26 Tower sshd[31702]: Disconnected from invalid user Dakota 188.166.152.106 port 59110 [preauth]
2019-09-01 12:17:34
36.103.241.211 attack
Sep  1 00:47:18 mail sshd\[1924\]: Failed password for root from 36.103.241.211 port 59534 ssh2
Sep  1 01:05:39 mail sshd\[2164\]: Invalid user backupftp from 36.103.241.211 port 56326
Sep  1 01:05:39 mail sshd\[2164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.103.241.211
...
2019-09-01 12:16:44
106.12.188.252 attackspambots
Automatic report - Banned IP Access
2019-09-01 12:02:05
144.217.85.183 attackspam
Aug 31 17:34:46 auw2 sshd\[31144\]: Invalid user shan from 144.217.85.183
Aug 31 17:34:46 auw2 sshd\[31144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.ip-144-217-85.net
Aug 31 17:34:48 auw2 sshd\[31144\]: Failed password for invalid user shan from 144.217.85.183 port 52585 ssh2
Aug 31 17:43:30 auw2 sshd\[32015\]: Invalid user johnny from 144.217.85.183
Aug 31 17:43:30 auw2 sshd\[32015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.ip-144-217-85.net
2019-09-01 11:48:25
178.128.178.187 attack
Forged login request.
2019-09-01 11:59:22
162.247.74.216 attack
Aug 31 17:35:55 hanapaa sshd\[2170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=phoolandevi.tor-exit.calyxinstitute.org  user=root
Aug 31 17:35:57 hanapaa sshd\[2170\]: Failed password for root from 162.247.74.216 port 41458 ssh2
Aug 31 17:35:59 hanapaa sshd\[2170\]: Failed password for root from 162.247.74.216 port 41458 ssh2
Aug 31 17:36:02 hanapaa sshd\[2170\]: Failed password for root from 162.247.74.216 port 41458 ssh2
Aug 31 17:36:04 hanapaa sshd\[2170\]: Failed password for root from 162.247.74.216 port 41458 ssh2
2019-09-01 11:48:09
125.64.94.221 attackbotsspam
01.09.2019 02:25:19 Connection to port 6670 blocked by firewall
2019-09-01 12:20:01
158.69.252.161 attackspam
Aug 30 06:32:18 cumulus sshd[12460]: Invalid user ftpuser from 158.69.252.161 port 53322
Aug 30 06:32:18 cumulus sshd[12460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.252.161
Aug 30 06:32:18 cumulus sshd[12461]: Invalid user ftpuser from 158.69.252.161 port 51700
Aug 30 06:32:18 cumulus sshd[12461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.252.161
Aug 30 06:32:18 cumulus sshd[12463]: Invalid user ftpuser from 158.69.252.161 port 45890
Aug 30 06:32:18 cumulus sshd[12462]: Invalid user ftpuser from 158.69.252.161 port 38804
Aug 30 06:32:18 cumulus sshd[12463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.252.161
Aug 30 06:32:18 cumulus sshd[12462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.252.161


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=158.69.2
2019-09-01 12:02:39
45.120.155.185 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-01 12:23:06
123.21.204.67 attackbotsspam
Lines containing failures of 123.21.204.67
Aug 31 23:39:24 shared04 sshd[20113]: Invalid user admin from 123.21.204.67 port 47786
Aug 31 23:39:24 shared04 sshd[20113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.204.67
Aug 31 23:39:26 shared04 sshd[20113]: Failed password for invalid user admin from 123.21.204.67 port 47786 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.21.204.67
2019-09-01 11:47:17

Recently Reported IPs

111.38.48.81 3.22.202.147 115.56.129.120 120.89.74.251
112.8.50.26 45.199.133.249 138.255.150.8 45.122.233.76
201.237.140.98 187.177.76.121 218.27.202.138 123.114.18.224
187.163.120.107 213.230.78.7 119.160.99.88 23.108.79.48
117.221.189.181 185.137.172.42 183.88.180.231 14.137.135.57