Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.38.42.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29800
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.38.42.21.			IN	A

;; AUTHORITY SECTION:
.			531	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010900 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 13:35:12 CST 2022
;; MSG SIZE  rcvd: 104
Host info
21.42.38.99.in-addr.arpa domain name pointer adsl-99-38-42-21.dsl.emhril.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.42.38.99.in-addr.arpa	name = adsl-99-38-42-21.dsl.emhril.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.185.237.255 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-02-07 08:35:40
54.213.133.161 attackspambots
02/07/2020-01:20:57.787455 54.213.133.161 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-07 08:36:19
158.69.204.172 attack
SSH_scan
2020-02-07 08:45:43
180.148.214.179 attackbotsspam
Feb  7 01:49:44 srv-ubuntu-dev3 sshd[126529]: Invalid user fjq from 180.148.214.179
Feb  7 01:49:44 srv-ubuntu-dev3 sshd[126529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.148.214.179
Feb  7 01:49:44 srv-ubuntu-dev3 sshd[126529]: Invalid user fjq from 180.148.214.179
Feb  7 01:49:46 srv-ubuntu-dev3 sshd[126529]: Failed password for invalid user fjq from 180.148.214.179 port 46556 ssh2
Feb  7 01:53:12 srv-ubuntu-dev3 sshd[126870]: Invalid user sxm from 180.148.214.179
Feb  7 01:53:12 srv-ubuntu-dev3 sshd[126870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.148.214.179
Feb  7 01:53:12 srv-ubuntu-dev3 sshd[126870]: Invalid user sxm from 180.148.214.179
Feb  7 01:53:15 srv-ubuntu-dev3 sshd[126870]: Failed password for invalid user sxm from 180.148.214.179 port 47508 ssh2
Feb  7 01:56:41 srv-ubuntu-dev3 sshd[127121]: Invalid user ww from 180.148.214.179
...
2020-02-07 09:01:06
125.72.232.227 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 125.72.232.227 (CN/China/-): 5 in the last 3600 secs - Sat Dec 29 12:36:37 2018
2020-02-07 08:29:12
61.228.130.231 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 61.228.130.231 (61-228-130-231.dynamic-ip.hinet.net): 5 in the last 3600 secs - Thu Dec 27 18:45:19 2018
2020-02-07 08:54:11
2804:2728:102:559:e55a:7149:b302:2778 attack
lfd: (smtpauth) Failed SMTP AUTH login from 2804:2728:102:559:e55a:7149:b302:2778 (Unknown): 5 in the last 3600 secs - Thu Dec 27 14:35:10 2018
2020-02-07 08:44:06
49.89.126.109 attack
Brute force blocker - service: proftpd1, proftpd2 - aantal: 99 - Thu Dec 27 22:20:17 2018
2020-02-07 08:37:24
144.217.49.53 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 144.217.49.53 (ip53.ip-144-217-49.net): 5 in the last 3600 secs - Thu Dec 27 00:52:20 2018
2020-02-07 08:55:05
114.230.69.226 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 114.230.69.226 (CN/China/-): 5 in the last 3600 secs - Thu Dec 27 12:48:29 2018
2020-02-07 08:53:51
50.254.13.85 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 50.254.13.85 (US/United States/50-254-13-85-static.hfc.comcastbusiness.net): 5 in the last 3600 secs - Sat Dec 29 18:39:51 2018
2020-02-07 08:29:38
103.210.50.120 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 103.210.50.120 (IN/India/103-210-50-120.rev.expl.in): 5 in the last 3600 secs - Tue Dec 25 17:50:00 2018
2020-02-07 09:09:57
49.86.178.140 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 49.86.178.140 (CN/China/-): 5 in the last 3600 secs - Thu Dec 27 20:12:27 2018
2020-02-07 08:40:59
37.114.161.139 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 37.114.161.139 (AZ/Azerbaijan/-): 5 in the last 3600 secs - Fri Dec 28 12:54:01 2018
2020-02-07 08:31:00
117.91.254.168 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 117.91.254.168 (CN/China/-): 5 in the last 3600 secs - Thu Dec 27 12:19:31 2018
2020-02-07 08:53:18

Recently Reported IPs

118.163.92.125 176.104.193.18 201.89.107.127 175.99.223.21
2a01:4f9:2a:22e::2 153.63.253.39 96.124.185.104 38.11.209.216
116.222.139.237 71.168.239.0 232.2.6.34 177.131.56.150
67.56.113.177 245.88.41.159 128.178.120.255 118.179.152.228
93.192.198.123 80.237.197.53 115.22.9.197 10.150.28.182