Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.72.58.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60065
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.72.58.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 14:34:56 CST 2025
;; MSG SIZE  rcvd: 104
Host info
42.58.72.99.in-addr.arpa domain name pointer 99-72-58-42.lightspeed.miamfl.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.58.72.99.in-addr.arpa	name = 99-72-58-42.lightspeed.miamfl.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.42.78.45 attackspam
Automatic report - Port Scan Attack
2020-06-07 07:01:09
125.227.26.24 attackbotsspam
Jun  7 04:56:27 webhost01 sshd[1300]: Failed password for root from 125.227.26.24 port 51304 ssh2
...
2020-06-07 06:35:18
117.50.40.157 attackspam
Invalid user peu01 from 117.50.40.157 port 52740
2020-06-07 07:12:16
221.143.48.143 attack
reported through recidive - multiple failed attempts(SSH)
2020-06-07 06:55:29
88.214.26.13 attack
24 attempts against mh-misbehave-ban on sonic
2020-06-07 06:39:28
37.187.16.30 attackbotsspam
Jun  7 00:24:24 vps647732 sshd[8389]: Failed password for root from 37.187.16.30 port 47614 ssh2
...
2020-06-07 07:11:15
138.121.120.91 attack
bruteforce detected
2020-06-07 06:34:47
202.131.69.18 attack
Invalid user test3 from 202.131.69.18 port 37980
2020-06-07 07:12:31
62.234.94.202 attack
Jun  7 00:21:34 eventyay sshd[29511]: Failed password for root from 62.234.94.202 port 44364 ssh2
Jun  7 00:25:05 eventyay sshd[29624]: Failed password for root from 62.234.94.202 port 40004 ssh2
...
2020-06-07 06:49:50
156.236.118.45 attackspambots
Lines containing failures of 156.236.118.45 (max 1000)
Jun  5 02:06:57 archiv sshd[8161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.118.45  user=r.r
Jun  5 02:06:58 archiv sshd[8161]: Failed password for r.r from 156.236.118.45 port 55222 ssh2
Jun  5 02:06:58 archiv sshd[8161]: Received disconnect from 156.236.118.45 port 55222:11: Bye Bye [preauth]
Jun  5 02:06:58 archiv sshd[8161]: Disconnected from 156.236.118.45 port 55222 [preauth]
Jun  5 02:20:14 archiv sshd[8469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.118.45  user=r.r
Jun  5 02:20:16 archiv sshd[8469]: Failed password for r.r from 156.236.118.45 port 53768 ssh2
Jun  5 02:20:16 archiv sshd[8469]: Received disconnect from 156.236.118.45 port 53768:11: Bye Bye [preauth]
Jun  5 02:20:16 archiv sshd[8469]: Disconnected from 156.236.118.45 port 53768 [preauth]
Jun  5 02:26:11 archiv sshd[8613]: pam_unix(sshd:a........
------------------------------
2020-06-07 06:40:29
122.168.125.226 attack
detected by Fail2Ban
2020-06-07 07:01:52
186.233.73.117 attackspambots
reported through recidive - multiple failed attempts(SSH)
2020-06-07 07:04:03
222.186.30.112 attack
06.06.2020 22:46:36 SSH access blocked by firewall
2020-06-07 06:48:23
162.243.142.93 attackspambots
Port Scan detected!
...
2020-06-07 06:41:23
206.189.225.85 attackbots
Invalid user duft from 206.189.225.85 port 34760
2020-06-07 06:54:11

Recently Reported IPs

12.247.112.240 230.23.123.197 239.84.63.231 161.3.165.229
241.15.212.122 234.3.101.92 159.61.184.154 9.171.175.98
37.163.73.106 130.53.226.174 184.47.162.127 198.200.222.2
223.231.168.198 134.216.96.245 62.37.72.247 155.5.31.17
164.187.190.207 157.164.155.69 120.45.170.87 160.231.0.232