Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.40.214.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.40.214.122.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 23:04:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 122.214.40.99.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 122.214.40.99.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.67.196.51 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-08 17:03:20
123.206.208.32 attackbots
Automatic report - Banned IP Access
2020-02-08 17:24:36
110.92.144.214 attackspam
Honeypot attack, port: 4567, PTR: PTR record not found
2020-02-08 17:27:21
159.203.117.137 attack
Feb  8 09:06:36 vlre-nyc-1 sshd\[22872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.117.137  user=root
Feb  8 09:06:38 vlre-nyc-1 sshd\[22872\]: Failed password for root from 159.203.117.137 port 59052 ssh2
Feb  8 09:07:29 vlre-nyc-1 sshd\[22881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.117.137  user=root
Feb  8 09:07:31 vlre-nyc-1 sshd\[22881\]: Failed password for root from 159.203.117.137 port 38900 ssh2
Feb  8 09:08:22 vlre-nyc-1 sshd\[22901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.117.137  user=root
...
2020-02-08 17:09:29
106.13.86.136 attack
Automatic report - SSH Brute-Force Attack
2020-02-08 17:30:46
175.6.5.233 attack
$f2bV_matches
2020-02-08 17:05:51
211.250.233.33 attackspambots
port scan and connect, tcp 23 (telnet)
2020-02-08 17:22:29
122.172.103.229 attackbots
Automatic report - Port Scan Attack
2020-02-08 17:39:41
160.179.250.196 attackbots
Feb  8 03:29:18 debian sshd[31308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.179.250.196  user=mail
Feb  8 03:29:20 debian sshd[31308]: Failed password for mail from 160.179.250.196 port 64158 ssh2
Feb  8 03:29:24 debian sshd[31310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.179.250.196  user=mail
Feb  8 03:29:26 debian sshd[31310]: Failed password for mail from 160.179.250.196 port 57291 ssh2
Feb  8 03:29:31 debian sshd[31312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.179.250.196  user=mail
...
2020-02-08 17:33:19
134.175.191.248 attackbotsspam
(sshd) Failed SSH login from 134.175.191.248 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb  8 04:48:59 andromeda sshd[4329]: Invalid user egv from 134.175.191.248 port 37324
Feb  8 04:49:01 andromeda sshd[4329]: Failed password for invalid user egv from 134.175.191.248 port 37324 ssh2
Feb  8 04:53:42 andromeda sshd[4526]: Invalid user toh from 134.175.191.248 port 54796
2020-02-08 17:28:55
106.12.6.58 attackbotsspam
Feb  8 08:07:36 srv01 sshd[1953]: Invalid user cdq from 106.12.6.58 port 52914
Feb  8 08:07:36 srv01 sshd[1953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.6.58
Feb  8 08:07:36 srv01 sshd[1953]: Invalid user cdq from 106.12.6.58 port 52914
Feb  8 08:07:38 srv01 sshd[1953]: Failed password for invalid user cdq from 106.12.6.58 port 52914 ssh2
Feb  8 08:11:12 srv01 sshd[2272]: Invalid user oil from 106.12.6.58 port 48274
...
2020-02-08 17:17:33
187.60.217.85 attackspam
" "
2020-02-08 17:39:11
187.154.111.156 attackspam
Unauthorized connection attempt from IP address 187.154.111.156 on Port 445(SMB)
2020-02-08 17:01:43
113.199.95.84 attack
Honeypot attack, port: 4567, PTR: PTR record not found
2020-02-08 17:15:31
54.148.226.208 attackspam
02/08/2020-10:24:48.067287 54.148.226.208 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-08 17:29:37

Recently Reported IPs

143.51.156.184 212.197.201.200 43.181.125.238 88.110.203.41
224.22.168.3 114.48.249.79 30.34.2.69 252.135.193.4
47.178.135.183 255.205.48.94 123.144.13.202 241.108.215.155
180.57.96.175 101.24.170.88 47.106.163.151 254.113.51.40
240.80.196.10 219.198.81.236 160.189.166.32 116.13.167.85