Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.70.145.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.70.145.199.			IN	A

;; AUTHORITY SECTION:
.			170	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101400 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 14 17:51:05 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 199.145.70.99.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 99.70.145.199.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
89.248.168.2 attackbots
Jun 10 19:46:33 ns3042688 courier-pop3d: LOGIN FAILED, user=contacto@makita-dolmar.biz, ip=\[::ffff:89.248.168.2\]
...
2020-06-11 01:50:30
193.19.145.213 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-11 01:52:00
41.207.184.182 attackspambots
reported through recidive - multiple failed attempts(SSH)
2020-06-11 02:01:31
122.55.51.146 attack
Honeypot attack, port: 445, PTR: 122.55.51.146.pldt.net.
2020-06-11 02:13:58
182.61.105.146 attackspambots
Failed password for invalid user Hille from 182.61.105.146 port 39660 ssh2
2020-06-11 02:12:06
180.76.141.221 attackspam
Jun 10 15:06:27 sip sshd[603331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.141.221 
Jun 10 15:06:27 sip sshd[603331]: Invalid user admin from 180.76.141.221 port 58198
Jun 10 15:06:29 sip sshd[603331]: Failed password for invalid user admin from 180.76.141.221 port 58198 ssh2
...
2020-06-11 01:48:18
49.235.221.172 attackspam
Jun 10 19:16:36 vpn01 sshd[18639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.221.172
Jun 10 19:16:38 vpn01 sshd[18639]: Failed password for invalid user avorionserver from 49.235.221.172 port 47208 ssh2
...
2020-06-11 01:44:50
41.170.14.90 attackspam
Tried sshing with brute force.
2020-06-11 01:39:03
43.228.245.151 attack
Automatic report - XMLRPC Attack
2020-06-11 01:41:21
171.103.25.82 attackspam
Unauthorized connection attempt from IP address 171.103.25.82 on port 993
2020-06-11 01:38:01
128.199.204.26 attackspam
Jun 10 16:13:28 fhem-rasp sshd[13038]: Invalid user monitor from 128.199.204.26 port 54182
...
2020-06-11 01:52:51
46.38.150.188 attack
Jun 10 19:16:02 mail postfix/smtpd\[5756\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 10 19:17:36 mail postfix/smtpd\[6414\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 10 19:49:06 mail postfix/smtpd\[7270\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 10 19:50:41 mail postfix/smtpd\[7270\]: warning: unknown\[46.38.150.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-06-11 01:50:47
180.76.174.246 attackspam
Jun 10 04:44:54 lvpxxxxxxx88-92-201-20 sshd[20774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.174.246  user=r.r
Jun 10 04:44:55 lvpxxxxxxx88-92-201-20 sshd[20774]: Failed password for r.r from 180.76.174.246 port 56522 ssh2
Jun 10 04:44:55 lvpxxxxxxx88-92-201-20 sshd[20774]: Received disconnect from 180.76.174.246: 11: Bye Bye [preauth]
Jun 10 04:49:27 lvpxxxxxxx88-92-201-20 sshd[20973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.174.246  user=r.r
Jun 10 04:49:28 lvpxxxxxxx88-92-201-20 sshd[20973]: Failed password for r.r from 180.76.174.246 port 51774 ssh2
Jun 10 04:49:29 lvpxxxxxxx88-92-201-20 sshd[20973]: Received disconnect from 180.76.174.246: 11: Bye Bye [preauth]
Jun 10 04:51:39 lvpxxxxxxx88-92-201-20 sshd[21044]: Failed password for invalid user amarco from 180.76.174.246 port 55438 ssh2
Jun 10 04:51:40 lvpxxxxxxx88-92-201-20 sshd[21044]: Received disconnect ........
-------------------------------
2020-06-11 02:12:44
36.229.56.82 attackspam
Unauthorised access (Jun 10) SRC=36.229.56.82 LEN=40 TTL=46 ID=45844 TCP DPT=8080 WINDOW=22526 SYN
2020-06-11 02:04:05
51.222.19.63 attack
Honeypot attack, port: 445, PTR: ip63.ip-51-222-19.net.
2020-06-11 01:56:22

Recently Reported IPs

112.85.255.233 33.78.67.47 42.83.151.101 61.221.67.65
203.73.105.30 94.189.70.23 192.72.5.162 163.20.181.186
60.244.204.252 227.116.242.178 111.249.73.138 128.14.20.244
1.169.90.229 111.218.0.164 151.139.128.15 117.55.134.173
139.27.109.190 54.0.43.6 28.179.20.178 201.43.25.176