Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.48.24.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6362
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.48.24.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120900 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 22:16:22 CST 2024
;; MSG SIZE  rcvd: 105
Host info
119.24.48.99.in-addr.arpa domain name pointer 99-48-24-119.lightspeed.pltnca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.24.48.99.in-addr.arpa	name = 99-48-24-119.lightspeed.pltnca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.63.174.149 attackspambots
SSH brutforce
2020-07-27 03:56:24
51.254.207.92 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-07-27 03:44:13
87.251.74.62 attack
Port scan on 14 port(s): 4074 4140 4168 4452 4581 4899 4913 4998 33246 33581 33596 33618 33852 33954
2020-07-27 03:54:01
115.231.221.129 attackbotsspam
Jul 26 09:53:20 NPSTNNYC01T sshd[2159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.221.129
Jul 26 09:53:22 NPSTNNYC01T sshd[2159]: Failed password for invalid user gm from 115.231.221.129 port 50850 ssh2
Jul 26 09:55:32 NPSTNNYC01T sshd[2393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.221.129
...
2020-07-27 03:36:38
36.94.82.47 attackbots
Unauthorized connection attempt from IP address 36.94.82.47 on Port 445(SMB)
2020-07-27 03:38:21
122.152.196.222 attack
Jul 26 20:49:33 rocket sshd[26489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.196.222
Jul 26 20:49:35 rocket sshd[26489]: Failed password for invalid user luan from 122.152.196.222 port 56554 ssh2
...
2020-07-27 03:56:42
182.71.77.58 attack
Unauthorized connection attempt from IP address 182.71.77.58 on Port 445(SMB)
2020-07-27 03:38:58
103.211.184.226 attack
Unauthorized connection attempt from IP address 103.211.184.226 on Port 445(SMB)
2020-07-27 03:40:43
192.35.168.209 attack
Unauthorized connection attempt detected from IP address 192.35.168.209 to port 9491
2020-07-27 03:55:20
103.54.202.221 attack
Automatic report - Port Scan Attack
2020-07-27 03:52:08
180.95.183.214 attack
 TCP (SYN) 180.95.183.214:46192 -> port 4454, len 44
2020-07-27 03:34:11
49.145.229.126 attackspam
Unauthorized connection attempt from IP address 49.145.229.126 on Port 445(SMB)
2020-07-27 03:44:39
178.46.213.9 attackspam
Jul 26 15:13:19 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=178.46.213.9 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=57472 PROTO=TCP SPT=3201 DPT=23 WINDOW=1799 RES=0x00 SYN URGP=0 Jul 26 15:13:19 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=178.46.213.9 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=57472 PROTO=TCP SPT=3201 DPT=23 WINDOW=1799 RES=0x00 SYN URGP=0 Jul 26 15:13:20 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=178.46.213.9 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=57472 PROTO=TCP SPT=3201 DPT=23 WINDOW=1799 RES=0x00 SYN URGP=0 Jul 26 15:13:20 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=178.46.213.9 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=57472 PROTO=TCP SPT=3201 DPT=23 WINDOW=1799 RES=0x00 SYN URGP=0 Jul 26 15:31:36 *hidden* kernel: [UFW BLOCK] IN=
...
2020-07-27 04:03:10
96.77.231.29 attack
Failed password for invalid user lgb from 96.77.231.29 port 63470 ssh2
2020-07-27 03:37:16
222.73.201.96 attack
SSH Brute Force
2020-07-27 03:32:07

Recently Reported IPs

169.145.48.174 40.219.20.138 225.94.204.210 216.137.165.228
245.130.172.35 134.234.160.98 229.140.158.102 204.148.254.234
136.28.182.12 64.212.142.183 246.145.16.85 14.22.44.43
99.20.230.252 24.65.238.137 208.134.185.134 206.201.62.13
232.182.243.46 66.175.226.208 195.113.44.125 196.181.45.210