Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.44.116.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48649
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.44.116.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 18:56:06 CST 2025
;; MSG SIZE  rcvd: 104
Host info
2.116.44.99.in-addr.arpa domain name pointer 99-44-116-2.lightspeed.sndgca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.116.44.99.in-addr.arpa	name = 99-44-116-2.lightspeed.sndgca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.211.192.70 attackspam
$f2bV_matches
2020-09-23 14:59:08
82.81.9.62 attackbotsspam
Listed on    abuseat.org plus barracudaCentral and zen-spamhaus   / proto=6  .  srcport=14404  .  dstport=23  .     (3080)
2020-09-23 14:38:35
94.131.216.48 attackspambots
Sep 22 17:02:01 ssh2 sshd[20670]: User root from 94.131.216.48 not allowed because not listed in AllowUsers
Sep 22 17:02:01 ssh2 sshd[20670]: Failed password for invalid user root from 94.131.216.48 port 53690 ssh2
Sep 22 17:02:01 ssh2 sshd[20670]: Connection closed by invalid user root 94.131.216.48 port 53690 [preauth]
...
2020-09-23 14:38:20
109.9.238.215 attackspam
Sep 22 16:49:34 logopedia-1vcpu-1gb-nyc1-01 sshd[102787]: Failed password for root from 109.9.238.215 port 45498 ssh2
...
2020-09-23 14:53:15
78.87.195.4 attack
Telnet Server BruteForce Attack
2020-09-23 14:35:01
103.254.198.67 attack
2020-09-23T05:27:41.215431paragon sshd[318285]: Failed password for invalid user tester from 103.254.198.67 port 48004 ssh2
2020-09-23T05:31:12.860957paragon sshd[318349]: Invalid user vncuser from 103.254.198.67 port 49806
2020-09-23T05:31:12.865159paragon sshd[318349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.198.67
2020-09-23T05:31:12.860957paragon sshd[318349]: Invalid user vncuser from 103.254.198.67 port 49806
2020-09-23T05:31:14.963580paragon sshd[318349]: Failed password for invalid user vncuser from 103.254.198.67 port 49806 ssh2
...
2020-09-23 14:54:11
185.191.171.7 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5d694d0e1e8fea24 | WAF_Rule_ID: 4c344d8609cf47c88674e7c5f743a22c | WAF_Kind: firewall | CF_Action: drop | Country: NL | CF_IPClass: unknown | Protocol: HTTP/1.1 | Method: GET | Host: www.wevg.org | User-Agent: Mozilla/5.0 (compatible; SemrushBot/6~bl; +http://www.semrush.com/bot.html) | CF_DC: IAD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-09-23 14:43:40
223.19.77.206 attackbotsspam
Sep 22 17:01:59 ssh2 sshd[20649]: User root from 223.19.77.206 not allowed because not listed in AllowUsers
Sep 22 17:01:59 ssh2 sshd[20649]: Failed password for invalid user root from 223.19.77.206 port 60271 ssh2
Sep 22 17:02:00 ssh2 sshd[20649]: Connection closed by invalid user root 223.19.77.206 port 60271 [preauth]
...
2020-09-23 15:02:06
218.92.0.175 attack
(sshd) Failed SSH login from 218.92.0.175 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 02:34:37 server sshd[23683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Sep 23 02:34:38 server sshd[23685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Sep 23 02:34:38 server sshd[23686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Sep 23 02:34:38 server sshd[23690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Sep 23 02:34:39 server sshd[23683]: Failed password for root from 218.92.0.175 port 61747 ssh2
2020-09-23 14:36:27
218.78.50.164 attackspam
SSH Bruteforce attack
2020-09-23 14:32:59
91.144.218.61 attackspambots
SSH Brute-force
2020-09-23 15:01:29
109.73.12.36 attackbotsspam
Sep 23 03:54:17 localhost sshd[48177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.73.12.36  user=root
Sep 23 03:54:19 localhost sshd[48177]: Failed password for root from 109.73.12.36 port 35056 ssh2
Sep 23 03:59:04 localhost sshd[48672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.73.12.36  user=root
Sep 23 03:59:06 localhost sshd[48672]: Failed password for root from 109.73.12.36 port 44364 ssh2
Sep 23 04:03:48 localhost sshd[49192]: Invalid user geoserver from 109.73.12.36 port 53682
...
2020-09-23 14:34:17
116.111.85.99 attackbotsspam
Unauthorized connection attempt from IP address 116.111.85.99 on Port 445(SMB)
2020-09-23 14:52:49
94.139.182.10 attackbots
Unauthorized connection attempt from IP address 94.139.182.10 on Port 445(SMB)
2020-09-23 14:55:40
113.169.114.119 attack
Sep 22 18:50:01 mail1 sshd[24303]: Did not receive identification string from 113.169.114.119 port 58241
Sep 22 18:50:06 mail1 sshd[24318]: Invalid user nagesh from 113.169.114.119 port 58958
Sep 22 18:50:06 mail1 sshd[24318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.169.114.119
Sep 22 18:50:08 mail1 sshd[24318]: Failed password for invalid user nagesh from 113.169.114.119 port 58958 ssh2
Sep 22 18:50:08 mail1 sshd[24318]: Connection closed by 113.169.114.119 port 58958 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.169.114.119
2020-09-23 14:48:49

Recently Reported IPs

202.109.10.138 207.20.199.159 241.111.183.95 95.41.232.249
153.158.137.66 61.193.132.206 228.121.160.128 78.205.133.19
131.188.42.160 114.145.43.1 138.26.197.125 225.151.200.233
73.241.48.228 108.232.143.131 171.131.5.129 236.13.135.158
83.220.73.70 145.51.71.78 132.73.72.217 175.65.209.122