Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chicago

Region: Illinois

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.42.22.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34881
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.42.22.149.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019073101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 01 03:52:06 CST 2019
;; MSG SIZE  rcvd: 116
Host info
149.22.42.99.in-addr.arpa domain name pointer 99-42-22-149.lightspeed.cicril.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
149.22.42.99.in-addr.arpa	name = 99-42-22-149.lightspeed.cicril.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.210 attackbotsspam
2020-08-27T06:16:16.752679server.espacesoutien.com sshd[505]: Failed password for root from 218.92.0.210 port 40408 ssh2
2020-08-27T06:16:20.128667server.espacesoutien.com sshd[505]: Failed password for root from 218.92.0.210 port 40408 ssh2
2020-08-27T06:17:27.740411server.espacesoutien.com sshd[521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.210  user=root
2020-08-27T06:17:29.853786server.espacesoutien.com sshd[521]: Failed password for root from 218.92.0.210 port 45606 ssh2
...
2020-08-27 15:31:37
14.185.252.223 attackbotsspam
20/8/26@23:49:41: FAIL: Alarm-Network address from=14.185.252.223
...
2020-08-27 15:00:51
159.65.131.14 attack
Wordpress malicious attack:[octablocked]
2020-08-27 15:21:43
154.223.182.138 attackspam
Invalid user boss from 154.223.182.138 port 54872
2020-08-27 15:06:02
211.209.60.23 attackbotsspam
2020-08-26 22:39:08.406275-0500  localhost smtpd[76455]: NOQUEUE: reject: RCPT from unknown[211.209.60.23]: 554 5.7.1 Service unavailable; Client host [211.209.60.23] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/211.209.60.23 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[211.209.60.23]>
2020-08-27 15:40:31
92.63.197.53 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 33568 proto: tcp cat: Misc Attackbytes: 60
2020-08-27 15:29:36
176.15.196.133 attack
20/8/26@23:48:19: FAIL: Alarm-Network address from=176.15.196.133
...
2020-08-27 15:35:27
183.89.44.5 attack
Port scan on 1 port(s): 1433
2020-08-27 15:31:20
31.200.130.201 attackspambots
Automatic report - XMLRPC Attack
2020-08-27 15:19:56
120.78.237.27 attackbotsspam
Aug 26 08:57:30 our-server-hostname sshd[28695]: Invalid user oracle from 120.78.237.27
Aug 26 08:57:30 our-server-hostname sshd[28695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.78.237.27 
Aug 26 08:57:32 our-server-hostname sshd[28695]: Failed password for invalid user oracle from 120.78.237.27 port 62470 ssh2
Aug 26 09:22:37 our-server-hostname sshd[1035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.78.237.27  user=r.r
Aug 26 09:22:39 our-server-hostname sshd[1035]: Failed password for r.r from 120.78.237.27 port 46443 ssh2
Aug 26 09:24:13 our-server-hostname sshd[1270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.78.237.27  user=r.r
Aug 26 09:24:15 our-server-hostname sshd[1270]: Failed password for r.r from 120.78.237.27 port 53110 ssh2
Aug 26 09:25:47 our-server-hostname sshd[1675]: pam_unix(sshd:auth): authentication fa........
-------------------------------
2020-08-27 15:28:28
27.5.68.243 attackbotsspam
1598500160 - 08/27/2020 05:49:20 Host: 27.5.68.243/27.5.68.243 Port: 445 TCP Blocked
...
2020-08-27 15:10:33
94.25.167.53 attack
Port probing on unauthorized port 445
2020-08-27 15:22:18
64.146.226.97 attackbots
(sshd) Failed SSH login from 64.146.226.97 (US/United States/ip-64-146-226-97.noanet.net): 5 in the last 300 secs
2020-08-27 15:03:49
103.57.80.40 attack
Brute Force
2020-08-27 15:37:15
185.220.102.7 attack
Aug 26 05:04:00 Ubuntu-1404-trusty-64-minimal sshd\[15164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.7  user=root
Aug 26 05:04:02 Ubuntu-1404-trusty-64-minimal sshd\[15164\]: Failed password for root from 185.220.102.7 port 41775 ssh2
Aug 27 05:48:10 Ubuntu-1404-trusty-64-minimal sshd\[15311\]: Invalid user admin from 185.220.102.7
Aug 27 05:48:10 Ubuntu-1404-trusty-64-minimal sshd\[15311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.7
Aug 27 05:48:12 Ubuntu-1404-trusty-64-minimal sshd\[15311\]: Failed password for invalid user admin from 185.220.102.7 port 38189 ssh2
2020-08-27 15:38:41

Recently Reported IPs

158.121.84.136 161.31.144.230 167.160.158.132 104.138.237.72
141.14.24.139 168.42.110.122 122.170.12.200 41.31.104.111
55.170.25.133 49.69.32.133 91.65.185.152 115.110.35.52
150.55.242.122 200.196.253.251 223.17.181.212 29.8.202.220
217.162.77.108 157.230.222.2 74.167.14.193 110.156.139.187