Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.72.242.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.72.242.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 22:56:15 CST 2025
;; MSG SIZE  rcvd: 106
Host info
248.242.72.99.in-addr.arpa domain name pointer 99-72-242-248.lightspeed.mdsnwi.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
248.242.72.99.in-addr.arpa	name = 99-72-242-248.lightspeed.mdsnwi.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.189.210.148 attack
Invalid user svn from 177.189.210.148 port 53257
2020-04-22 03:29:43
51.89.164.153 attack
SSH login attempts.
2020-04-22 02:57:37
182.189.125.138 attackspambots
Invalid user admin from 182.189.125.138 port 41182
2020-04-22 03:26:31
195.122.226.164 attack
[ssh] SSH attack
2020-04-22 03:19:29
201.90.101.165 attack
Apr 21 15:01:38 *** sshd[6822]: Invalid user admin from 201.90.101.165
2020-04-22 03:18:11
191.235.94.168 attackspambots
Invalid user test from 191.235.94.168 port 44830
2020-04-22 03:21:05
60.174.248.244 attackbots
Invalid user ansible from 60.174.248.244 port 54589
2020-04-22 02:54:42
58.218.66.102 attackbotsspam
Invalid user heron from 58.218.66.102 port 12808
2020-04-22 02:54:57
45.55.233.213 attack
SSH login attempts.
2020-04-22 03:01:28
185.84.138.139 attackspam
Invalid user teste from 185.84.138.139 port 53256
2020-04-22 03:25:19
46.105.149.168 attackbots
SSHD brute force attack detected by fail2ban
2020-04-22 03:00:17
1.245.61.144 attackbotsspam
Invalid user admin from 1.245.61.144 port 41200
2020-04-22 03:10:48
36.99.39.95 attackbots
Apr 21 17:19:03 vmd48417 sshd[13314]: Failed password for root from 36.99.39.95 port 49874 ssh2
2020-04-22 03:05:17
190.5.141.77 attackbots
Invalid user fl from 190.5.141.77 port 38562
2020-04-22 03:22:26
197.48.107.50 attackspam
Invalid user admin from 197.48.107.50 port 52998
2020-04-22 03:19:01

Recently Reported IPs

133.219.231.229 44.171.67.136 209.99.48.217 60.53.236.26
245.46.212.112 237.79.210.180 47.89.119.131 121.10.206.144
202.49.39.42 43.163.87.186 33.194.176.72 51.160.150.226
3.167.247.240 42.61.211.220 187.88.208.83 240.34.39.1
139.145.84.243 247.84.254.175 172.237.166.32 37.112.35.51