Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Houston

Region: Texas

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Data Communications Services

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.105.142.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35411
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.105.142.56.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071000 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 11 02:58:07 CST 2019
;; MSG SIZE  rcvd: 117
Host info
56.142.105.12.in-addr.arpa domain name pointer ftp1.eduneering.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
56.142.105.12.in-addr.arpa	name = ftp1.eduneering.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.214.174.231 attackbots
Forbidden directory scan :: 2020/05/24 03:51:18 [error] 1046#1046: *1193405 access forbidden by rule, client: 103.214.174.231, server: [censored_1], request: "GET /knowledge-base/vbs... HTTP/1.1", host: "www.[censored_1]"
2020-05-24 15:41:45
181.52.249.213 attackbotsspam
2020-05-24T10:38:34.944730afi-git.jinr.ru sshd[2997]: Invalid user kje from 181.52.249.213 port 46798
2020-05-24T10:38:34.947891afi-git.jinr.ru sshd[2997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.52.249.213
2020-05-24T10:38:34.944730afi-git.jinr.ru sshd[2997]: Invalid user kje from 181.52.249.213 port 46798
2020-05-24T10:38:37.440004afi-git.jinr.ru sshd[2997]: Failed password for invalid user kje from 181.52.249.213 port 46798 ssh2
2020-05-24T10:40:36.819760afi-git.jinr.ru sshd[3511]: Invalid user icp from 181.52.249.213 port 48458
...
2020-05-24 15:43:20
159.65.137.23 attack
Invalid user zoa from 159.65.137.23 port 38486
2020-05-24 15:13:22
116.49.250.20 attackspam
"Unauthorized connection attempt on SSHD detected"
2020-05-24 15:42:41
1.34.254.165 attackbotsspam
Port probing on unauthorized port 23
2020-05-24 15:36:46
45.71.100.67 attack
May 24 12:35:16 dhoomketu sshd[146934]: Invalid user shkim from 45.71.100.67 port 37211
May 24 12:35:16 dhoomketu sshd[146934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.71.100.67 
May 24 12:35:16 dhoomketu sshd[146934]: Invalid user shkim from 45.71.100.67 port 37211
May 24 12:35:19 dhoomketu sshd[146934]: Failed password for invalid user shkim from 45.71.100.67 port 37211 ssh2
May 24 12:39:46 dhoomketu sshd[147095]: Invalid user isseitkd from 45.71.100.67 port 39854
...
2020-05-24 15:19:33
3.94.182.23 attackspambots
Automatic report - Port Scan
2020-05-24 15:21:01
163.172.58.63 attackspam
Unauthorized SSH login attempts
2020-05-24 15:07:00
122.51.91.131 attackspambots
ssh brute force
2020-05-24 15:39:28
35.184.155.136 attackspambots
May 24 05:51:41 pve1 sshd[527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.184.155.136 
May 24 05:51:42 pve1 sshd[527]: Failed password for invalid user jqd from 35.184.155.136 port 55718 ssh2
...
2020-05-24 15:25:51
89.136.52.0 attack
(sshd) Failed SSH login from 89.136.52.0 (RO/Romania/-): 5 in the last 3600 secs
2020-05-24 15:45:30
166.111.152.230 attackbotsspam
May 24 08:56:04 xeon sshd[20969]: Failed password for invalid user der from 166.111.152.230 port 51548 ssh2
2020-05-24 15:21:33
47.88.227.250 attackbots
May 24 04:58:06 karger wordpress(buerg)[13637]: Authentication attempt for unknown user domi from 47.88.227.250
May 24 05:51:18 karger wordpress(buerg)[13637]: Authentication attempt for unknown user domi from 47.88.227.250
...
2020-05-24 15:41:09
195.54.166.181 attackspam
Port scan on 3 port(s): 6314 6404 6755
2020-05-24 15:23:22
218.92.0.212 attackbots
SSH Brute-Force attacks
2020-05-24 15:16:48

Recently Reported IPs

185.90.255.45 164.68.101.156 13.40.54.197 198.2.200.102
8.12.175.245 96.104.4.134 115.139.169.80 183.192.240.97
194.35.193.116 222.25.74.88 67.207.95.160 209.217.214.65
14.166.131.187 201.212.192.103 93.117.35.119 59.68.140.46
134.231.18.222 55.16.230.229 204.214.186.94 125.59.162.28