Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.49.45.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43344
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.49.45.66.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072200 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 22 19:18:05 CST 2019
;; MSG SIZE  rcvd: 115
Host info
66.45.49.99.in-addr.arpa domain name pointer adsl-99-49-45-66.dsl.austtx.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
66.45.49.99.in-addr.arpa	name = adsl-99-49-45-66.dsl.austtx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.24.178.224 attack
Jan 21 14:11:45 lock-38 sshd[21419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.178.224 
Jan 21 14:11:47 lock-38 sshd[21419]: Failed password for invalid user pub from 118.24.178.224 port 48036 ssh2
...
2020-01-21 22:14:35
76.172.128.34 attack
Invalid user admin from 76.172.128.34 port 57633
2020-01-21 22:37:07
51.89.151.214 attackspam
Unauthorized connection attempt detected from IP address 51.89.151.214 to port 2220 [J]
2020-01-21 22:41:44
111.230.157.219 attackbots
Invalid user backups from 111.230.157.219 port 54700
2020-01-21 22:21:23
59.36.83.249 attack
Unauthorized connection attempt detected from IP address 59.36.83.249 to port 2220 [J]
2020-01-21 22:39:08
113.172.213.123 attackspam
Unauthorized connection attempt detected from IP address 113.172.213.123 to port 22 [J]
2020-01-21 22:19:31
80.211.136.132 attack
ZTE Router Exploit Scanner
2020-01-21 22:35:48
113.162.191.75 attack
Invalid user admin from 113.162.191.75 port 60898
2020-01-21 22:20:26
101.89.145.133 attackspambots
Unauthorized connection attempt detected from IP address 101.89.145.133 to port 2220 [J]
2020-01-21 22:30:31
122.155.174.36 attackbotsspam
Unauthorized connection attempt detected from IP address 122.155.174.36 to port 2220 [J]
2020-01-21 22:11:07
107.170.76.170 attack
Unauthorized connection attempt detected from IP address 107.170.76.170 to port 2220 [J]
2020-01-21 22:24:06
41.218.222.162 attackbots
Invalid user admin from 41.218.222.162 port 47894
2020-01-21 22:47:47
125.91.126.205 attack
Invalid user toby from 125.91.126.205 port 40487
2020-01-21 22:09:31
49.73.61.26 attackbotsspam
Unauthorized connection attempt detected from IP address 49.73.61.26 to port 2220 [J]
2020-01-21 22:46:17
122.51.217.125 attack
Invalid user ubuntu from 122.51.217.125 port 9408
2020-01-21 22:11:42

Recently Reported IPs

151.91.113.107 110.87.32.121 122.106.218.143 108.222.220.194
125.161.136.106 82.44.91.117 36.76.200.118 1.162.172.72
116.89.50.107 87.255.200.100 222.255.195.136 113.161.220.150
219.16.170.123 56.27.133.130 121.81.132.170 35.48.178.128
219.122.225.25 117.2.166.20 211.108.171.42 5.94.48.71