Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.68.21.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56500
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.68.21.195.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052900 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 29 21:40:37 CST 2019
;; MSG SIZE  rcvd: 116

Host info
195.21.68.99.in-addr.arpa domain name pointer adsl-99-68-21-195.dsl.lsan03.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
195.21.68.99.in-addr.arpa	name = adsl-99-68-21-195.dsl.lsan03.sbcglobal.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
206.189.138.99 attackbotsspam
Jul 15 13:12:35 server sshd[25020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.138.99
Jul 15 13:12:37 server sshd[25020]: Failed password for invalid user deploy from 206.189.138.99 port 44438 ssh2
Jul 15 13:16:18 server sshd[25245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.138.99
...
2020-07-15 19:39:19
107.182.191.188 attackspam
2020-07-15T03:16:00.229321suse-nuc sshd[17452]: Invalid user sgs from 107.182.191.188 port 47044
...
2020-07-15 19:32:24
200.70.37.206 attack
Unauthorized connection attempt from IP address 200.70.37.206 on Port 445(SMB)
2020-07-15 19:49:39
157.55.202.218 attackspambots
Jul 15 13:11:55 rancher-0 sshd[335843]: Invalid user admin from 157.55.202.218 port 32235
...
2020-07-15 19:19:02
20.188.56.101 attack
Jul 15 13:37:03 vpn01 sshd[14704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.188.56.101
Jul 15 13:37:05 vpn01 sshd[14704]: Failed password for invalid user yankees from 20.188.56.101 port 28076 ssh2
...
2020-07-15 19:38:35
117.4.106.176 attackbots
Unauthorized connection attempt from IP address 117.4.106.176 on Port 445(SMB)
2020-07-15 19:20:44
13.89.235.229 attackbotsspam
Multiple SSH login attempts.
2020-07-15 19:51:06
40.115.242.24 attackspam
Jul 15 21:06:23 localhost sshd[2885824]: Invalid user admin from 40.115.242.24 port 4822
...
2020-07-15 19:15:41
46.38.150.94 attackspambots
Jul 15 13:05:54 web02.agentur-b-2.de postfix/smtpd[374235]: warning: unknown[46.38.150.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 13:06:35 web02.agentur-b-2.de postfix/smtpd[361927]: warning: unknown[46.38.150.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 13:07:15 web02.agentur-b-2.de postfix/smtpd[361927]: warning: unknown[46.38.150.94]: SASL LOGIN authentication failed: VXNlcm5hbWU6
Jul 15 13:07:56 web02.agentur-b-2.de postfix/smtpd[374655]: warning: unknown[46.38.150.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 13:08:36 web02.agentur-b-2.de postfix/smtpd[374655]: warning: unknown[46.38.150.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-15 19:49:12
143.137.144.218 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-15 19:19:50
168.61.51.224 attackbots
Jul 15 13:17:22 *hidden* sshd[10045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.51.224 Jul 15 13:17:24 *hidden* sshd[10045]: Failed password for invalid user admin from 168.61.51.224 port 6253 ssh2
2020-07-15 19:36:01
89.37.187.0 attack
Unauthorized connection attempt from IP address 89.37.187.0 on Port 445(SMB)
2020-07-15 19:27:23
188.6.64.248 attack
Invalid user giannina from 188.6.64.248 port 60826
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=bc0640f8.dsl.pool.telekom.hu
Invalid user giannina from 188.6.64.248 port 60826
Failed password for invalid user giannina from 188.6.64.248 port 60826 ssh2
Invalid user oracle from 188.6.64.248 port 57670
2020-07-15 19:40:57
147.135.253.94 attack
[2020-07-15 07:24:47] NOTICE[1150] chan_sip.c: Registration from '' failed for '147.135.253.94:51958' - Wrong password
[2020-07-15 07:24:47] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-15T07:24:47.951-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="758",SessionID="0x7fcb4c0aaa48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/147.135.253.94/51958",Challenge="58ac98b8",ReceivedChallenge="58ac98b8",ReceivedHash="ea07f7a6728667cdb6c6e805f656f6d0"
[2020-07-15 07:25:54] NOTICE[1150] chan_sip.c: Registration from '' failed for '147.135.253.94:49289' - Wrong password
[2020-07-15 07:25:54] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-15T07:25:54.077-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="759",SessionID="0x7fcb4c2700b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/147.135.253.94
...
2020-07-15 19:28:06
167.114.115.33 attack
Jul 15 07:16:06 ws19vmsma01 sshd[48757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.115.33
Jul 15 07:16:08 ws19vmsma01 sshd[48757]: Failed password for invalid user maileh from 167.114.115.33 port 47468 ssh2
...
2020-07-15 19:18:34

Recently Reported IPs

153.197.179.113 128.199.104.232 35.83.137.130 14.62.105.126
116.252.63.240 40.132.6.183 80.236.193.23 143.90.116.197
183.185.45.90 156.170.82.71 67.212.40.180 203.154.76.17
156.67.211.177 1.196.107.202 81.249.94.126 87.11.163.92
125.165.176.115 140.243.147.220 89.46.106.95 184.50.114.149