Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.36.20.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47376
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.36.20.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:58:22 CST 2025
;; MSG SIZE  rcvd: 104
Host info
81.20.36.99.in-addr.arpa domain name pointer 99-36-20-81.lightspeed.tukrga.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.20.36.99.in-addr.arpa	name = 99-36-20-81.lightspeed.tukrga.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.0.4.31 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 00:57:11
41.38.203.171 attackbots
Automatic report - Port Scan Attack
2020-01-14 00:44:03
187.19.8.234 attackbotsspam
Unauthorized connection attempt detected from IP address 187.19.8.234 to port 2323 [J]
2020-01-14 01:04:24
121.122.49.234 attackspambots
Jan 13 03:10:15 foo sshd[17708]: Invalid user vorname from 121.122.49.234
Jan 13 03:10:15 foo sshd[17708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.122.49.234 
Jan 13 03:10:16 foo sshd[17708]: Failed password for invalid user vorname from 121.122.49.234 port 38137 ssh2
Jan 13 03:10:17 foo sshd[17708]: Received disconnect from 121.122.49.234: 11: Bye Bye [preauth]
Jan 13 03:25:56 foo sshd[18435]: Invalid user hani from 121.122.49.234
Jan 13 03:25:56 foo sshd[18435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.122.49.234 
Jan 13 03:25:58 foo sshd[18435]: Failed password for invalid user hani from 121.122.49.234 port 52288 ssh2
Jan 13 03:25:58 foo sshd[18435]: Received disconnect from 121.122.49.234: 11: Bye Bye [preauth]
Jan 13 03:29:10 foo sshd[18552]: Invalid user netbios from 121.122.49.234
Jan 13 03:29:10 foo sshd[18552]: pam_unix(sshd:auth): authentication failure; logn........
-------------------------------
2020-01-14 00:53:59
49.1.33.14 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-01-14 01:11:32
216.245.210.54 attackspambots
Trying ports that it shouldn't be.
2020-01-14 01:07:20
52.73.169.169 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 00:45:05
196.64.228.205 attackspam
[Mon Jan 13 08:44:13 2020] Failed password for invalid user user from 196.64.228.205 port 64036 ssh2
[Mon Jan 13 08:45:05 2020] Failed password for invalid user user from 196.64.228.205 port 58433 ssh2
[Mon Jan 13 08:45:43 2020] Failed password for invalid user user from 196.64.228.205 port 49650 ssh2
[Mon Jan 13 08:48:10 2020] Failed password for invalid user user from 196.64.228.205 port 62580 ssh2
[Mon Jan 13 08:48:44 2020] Failed password for invalid user user from 196.64.228.205 port 52905 ssh2
[Mon Jan 13 08:50:47 2020] Failed password for invalid user user from 196.64.228.205 port 61188 ssh2
[Mon Jan 13 08:53:44 2020] Failed password for invalid user user from 196.64.228.205 port 63165 ssh2
[Mon Jan 13 08:55:49 2020] Failed password for invalid user user from 196.64.228.205 port 55016 ssh2
[Mon Jan 13 08:56:00 2020] Failed password for invalid user user from 196.64.228.205 port 57222 ssh2
[Mon Jan 13 08:56:44 2020] Failed password for invalid user user from 196.6........
-------------------------------
2020-01-14 00:33:18
62.141.240.213 attack
Jan 13 17:16:30 * sshd[20473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.141.240.213
Jan 13 17:16:32 * sshd[20473]: Failed password for invalid user hassan from 62.141.240.213 port 63009 ssh2
2020-01-14 01:06:50
112.85.42.173 attackbots
Jan 13 21:27:43 gw1 sshd[21604]: Failed password for root from 112.85.42.173 port 42019 ssh2
Jan 13 21:27:58 gw1 sshd[21604]: Failed password for root from 112.85.42.173 port 42019 ssh2
Jan 13 21:27:58 gw1 sshd[21604]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 42019 ssh2 [preauth]
...
2020-01-14 00:42:20
80.210.27.148 attack
Unauthorized connection attempt detected from IP address 80.210.27.148 to port 23 [J]
2020-01-14 01:06:25
189.212.117.14 attackspambots
Jan 13 14:06:17 vps339862 kernel: \[3593551.981244\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:22:9b:64:31:28:de:08:00 SRC=189.212.117.14 DST=51.254.206.43 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=36629 DF PROTO=TCP SPT=34288 DPT=23 SEQ=4016871887 ACK=0 WINDOW=5840 RES=0x00 SYN URGP=0 OPT \(020405B40402080AB36316DA0000000001030302\) 
Jan 13 14:06:20 vps339862 kernel: \[3593555.001905\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:22:9b:64:31:28:de:08:00 SRC=189.212.117.14 DST=51.254.206.43 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=36630 DF PROTO=TCP SPT=34288 DPT=23 SEQ=4016871887 ACK=0 WINDOW=5840 RES=0x00 SYN URGP=0 OPT \(020405B40402080AB36322A70000000001030302\) 
Jan 13 14:06:26 vps339862 kernel: \[3593561.001981\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:22:9b:64:31:28:de:08:00 SRC=189.212.117.14 DST=51.254.206.43 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=36631 DF PROTO=TCP SPT=34288 DPT=23 SEQ=4016871887 ACK=0 WINDOW=5840 RES=0x00 SYN URGP=0 
...
2020-01-14 00:39:52
176.100.70.102 attackspam
1578920769 - 01/13/2020 14:06:09 Host: 176.100.70.102/176.100.70.102 Port: 445 TCP Blocked
2020-01-14 01:09:18
111.95.141.34 attackspambots
Unauthorized connection attempt detected from IP address 111.95.141.34 to port 2220 [J]
2020-01-14 00:33:47
54.37.232.108 attack
Jan 13 17:22:29 meumeu sshd[22625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.232.108 
Jan 13 17:22:31 meumeu sshd[22625]: Failed password for invalid user sm from 54.37.232.108 port 47166 ssh2
Jan 13 17:25:20 meumeu sshd[23082]: Failed password for root from 54.37.232.108 port 46480 ssh2
...
2020-01-14 00:48:06

Recently Reported IPs

74.199.216.224 39.107.53.154 119.222.212.79 67.16.69.38
14.41.166.23 96.106.95.37 70.93.25.6 92.236.67.234
248.163.195.153 172.150.7.215 152.204.37.1 139.102.7.249
127.214.35.197 201.76.121.61 202.29.143.112 219.108.80.61
118.151.4.204 7.130.122.239 162.224.176.127 22.125.103.42