Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Marietta

Region: Georgia

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.99.45.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.99.45.154.			IN	A

;; AUTHORITY SECTION:
.			251	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092601 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:42:18 CST 2019
;; MSG SIZE  rcvd: 116
Host info
154.45.99.99.in-addr.arpa domain name pointer 99-99-45-154.lightspeed.tukrga.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
154.45.99.99.in-addr.arpa	name = 99-99-45-154.lightspeed.tukrga.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.181.217.13 attackbots
B: Magento admin pass test (abusive)
2019-08-01 10:18:28
191.53.223.171 attackspambots
Try access to SMTP/POP/IMAP server.
2019-08-01 10:54:01
104.206.128.18 attack
Honeypot attack, port: 23, PTR: 18-128.206.104.serverhubrdns.in-addr.arpa.
2019-08-01 11:05:28
163.172.192.210 attackspam
\[2019-07-31 22:48:39\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-31T22:48:39.761-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="04011972592277524",SessionID="0x7ff4d0348688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.192.210/50715",ACLName="no_extension_match"
\[2019-07-31 22:52:23\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-31T22:52:23.711-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="03011972592277524",SessionID="0x7ff4d00cdaf8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.192.210/55325",ACLName="no_extension_match"
\[2019-07-31 22:55:48\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-31T22:55:48.879-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="02011972592277524",SessionID="0x7ff4d03d6958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.192.210/55245",ACL
2019-08-01 10:57:51
159.203.13.4 attack
Aug  1 04:33:43 vpn01 sshd\[10055\]: Invalid user jamal from 159.203.13.4
Aug  1 04:33:43 vpn01 sshd\[10055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.13.4
Aug  1 04:33:44 vpn01 sshd\[10055\]: Failed password for invalid user jamal from 159.203.13.4 port 52528 ssh2
2019-08-01 11:05:43
160.153.147.141 attack
xmlrpc attack
2019-08-01 10:51:34
185.220.101.44 attackbots
Automatic report - Banned IP Access
2019-08-01 10:38:29
36.75.195.46 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-01 10:42:32
115.166.37.182 attackbotsspam
Automatic report - Port Scan Attack
2019-08-01 10:34:21
40.73.29.153 attackspam
SSH Brute-Force reported by Fail2Ban
2019-08-01 10:20:55
119.202.14.158 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-01 10:40:00
178.242.64.22 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-01 10:40:19
93.119.239.236 attackspambots
Honeypot attack, port: 23, PTR: host-static-93-119-239-236.moldtelecom.md.
2019-08-01 10:48:33
153.36.242.114 attackspambots
Jul 31 22:26:06 ny01 sshd[25124]: Failed password for root from 153.36.242.114 port 36604 ssh2
Jul 31 22:26:15 ny01 sshd[25138]: Failed password for root from 153.36.242.114 port 63839 ssh2
2019-08-01 10:28:05
188.255.109.39 attack
Apr 15 04:55:44 ubuntu sshd[29564]: Failed password for root from 188.255.109.39 port 42726 ssh2
Apr 15 04:55:46 ubuntu sshd[29564]: Failed password for root from 188.255.109.39 port 42726 ssh2
Apr 15 04:55:48 ubuntu sshd[29564]: Failed password for root from 188.255.109.39 port 42726 ssh2
Apr 15 04:55:51 ubuntu sshd[29564]: Failed password for root from 188.255.109.39 port 42726 ssh2
2019-08-01 11:06:38

Recently Reported IPs

218.228.215.198 185.165.168.77 82.79.151.162 75.168.122.97
59.95.71.246 13.235.226.185 72.71.233.109 46.41.100.154
99.153.223.236 100.6.228.134 103.79.169.155 78.231.152.23
191.243.246.2 223.197.240.143 130.71.4.60 200.68.139.8
0.90.249.141 148.153.141.252 219.38.23.81 62.148.138.162