Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.53.93.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.53.93.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:05:44 CST 2025
;; MSG SIZE  rcvd: 104
Host info
99.93.53.99.in-addr.arpa domain name pointer 99-53-93-99.lightspeed.irvnca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.93.53.99.in-addr.arpa	name = 99-53-93-99.lightspeed.irvnca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.37.205.162 attack
Invalid user student from 54.37.205.162 port 60184
2019-07-28 08:04:20
186.206.134.122 attack
Jul 28 02:55:45 srv-4 sshd\[14497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.134.122  user=root
Jul 28 02:55:47 srv-4 sshd\[14497\]: Failed password for root from 186.206.134.122 port 58300 ssh2
Jul 28 03:01:20 srv-4 sshd\[14664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.134.122  user=root
...
2019-07-28 08:22:06
221.125.165.59 attackbots
Jul 28 01:10:58 fr01 sshd[14526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59  user=root
Jul 28 01:11:00 fr01 sshd[14526]: Failed password for root from 221.125.165.59 port 33702 ssh2
...
2019-07-28 07:41:56
89.29.135.30 attackspambots
Invalid user pi from 89.29.135.30 port 48200
2019-07-28 08:03:12
14.186.189.111 attack
Invalid user admin from 14.186.189.111 port 58543
2019-07-28 08:07:52
13.95.8.102 attackbots
Invalid user iulian from 13.95.8.102 port 42502
2019-07-28 08:08:14
146.185.149.245 attackspambots
Invalid user backuppc from 146.185.149.245 port 56333
2019-07-28 07:58:52
159.89.194.103 attackbots
Invalid user estelle from 159.89.194.103 port 33046
2019-07-28 08:23:49
46.107.102.102 attack
Invalid user clare from 46.107.102.102 port 58228
2019-07-28 08:18:10
51.91.36.96 attack
Invalid user hadoop from 51.91.36.96 port 33480
2019-07-28 08:05:21
69.165.239.85 attackbotsspam
SSH invalid-user multiple login attempts
2019-07-28 08:27:35
85.26.40.243 attackbots
Invalid user support from 85.26.40.243 port 59850
2019-07-28 08:03:38
83.211.109.73 attackbotsspam
Invalid user adminftp from 83.211.109.73 port 49076
2019-07-28 08:03:53
142.93.198.86 attackbotsspam
Invalid user test7 from 142.93.198.86 port 36166
2019-07-28 08:12:14
206.189.145.152 attackbots
SSH Brute Force
2019-07-28 07:56:24

Recently Reported IPs

125.14.91.122 140.131.192.194 206.209.107.86 128.100.37.164
145.27.207.213 173.25.206.227 149.145.8.58 157.124.255.226
43.114.133.124 137.215.130.67 246.51.162.184 185.142.112.171
69.140.189.192 45.164.161.98 135.166.143.191 211.158.15.4
75.174.103.203 243.72.172.91 149.47.207.159 63.175.34.139