Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       12.0.0.0 - 12.255.255.255
CIDR:           12.0.0.0/8
NetName:        ATT
NetHandle:      NET-12-0-0-0-1
Parent:         NET12 (NET-12-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   AT&T Enterprises, LLC (AEL-360)
RegDate:        1983-08-23
Updated:        2025-12-02
Comment:        IP assignments within this IP Block range are STATIC, not dynamic.
Ref:            https://rdap.arin.net/registry/ip/12.0.0.0



OrgName:        AT&T Enterprises, LLC
OrgId:          AEL-360
Address:        208 S. Akard St.
City:           Dallas
StateProv:      TX
PostalCode:     75202
Country:        US
RegDate:        2024-11-22
Updated:        2025-10-29
Ref:            https://rdap.arin.net/registry/entity/AEL-360


OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName:   Routing POC
OrgRoutingPhone:  +1-999-999-9999 
OrgRoutingEmail:  routing_poc@att.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI59-ARIN

OrgTechHandle: ZS44-ARIN
OrgTechName:   IPAdmin-ATT Internet Services
OrgTechPhone:  +1-888-510-5545 
OrgTechEmail:  ipadmin@semail.att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZS44-ARIN

OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-919-319-8167 
OrgAbuseEmail:  abuse@att.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName:   IP Team
OrgTechPhone:  +1-888-876-2382 
OrgTechEmail:  rm-ipspecialist@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ICC-ARIN

# end


# start

NetRange:       12.12.0.0 - 12.12.3.255
CIDR:           12.12.0.0/22
NetName:        ATT-NET-12-12-0-0
NetHandle:      NET-12-12-0-0-1
Parent:         ATT (NET-12-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Alascom, Inc. (ALAS)
RegDate:        2024-11-21
Updated:        2024-11-21
Ref:            https://rdap.arin.net/registry/ip/12.12.0.0


OrgName:        Alascom, Inc.
OrgId:          ALAS
Address:        505 E Bluff Dr
City:           Anchorage
StateProv:      AK
PostalCode:     99501
Country:        US
RegDate:        1998-04-22
Updated:        2009-10-01
Ref:            https://rdap.arin.net/registry/entity/ALAS


OrgTechHandle: TECHA15-ARIN
OrgTechName:   tech-arin
OrgTechPhone:  +1-800-403-9234 
OrgTechEmail:  DL-ATSAlaska@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECHA15-ARIN

OrgAbuseHandle: ABUSE1204-ARIN
OrgAbuseName:   abuse-arin
OrgAbusePhone:  +1-800-403-9234 
OrgAbuseEmail:  DL-ATSAlaska@att.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1204-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.12.0.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31388
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.12.0.0.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042800 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 16:33:06 CST 2026
;; MSG SIZE  rcvd: 102
Host info
Host 0.0.12.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.0.12.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
207.154.239.128 attackspambots
Invalid user riley from 207.154.239.128 port 50424
2019-10-22 18:00:57
80.82.77.212 attackspambots
10/22/2019-06:31:59.381123 80.82.77.212 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2019-10-22 18:32:38
177.47.130.181 attackbotsspam
$f2bV_matches
2019-10-22 18:28:10
159.203.201.26 attackspambots
firewall-block, port(s): 51152/tcp
2019-10-22 18:31:48
106.12.130.148 attack
Oct 22 08:53:26 lnxweb62 sshd[5253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.130.148
2019-10-22 18:13:46
2605:6400:300:3::2 attack
WordPress wp-login brute force :: 2605:6400:300:3::2 0.048 BYPASS [22/Oct/2019:19:49:08  1100] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-22 18:23:20
52.130.67.235 attackbotsspam
Invalid user pi from 52.130.67.235 port 38366
2019-10-22 18:30:05
167.71.201.242 attackbots
UTC: 2019-10-21 port: 17/udp
2019-10-22 18:22:01
74.82.47.39 attackspam
firewall-block, port(s): 10001/udp
2019-10-22 18:18:49
81.134.41.100 attack
Oct 22 04:07:56 www_kotimaassa_fi sshd[5005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.134.41.100
Oct 22 04:07:58 www_kotimaassa_fi sshd[5005]: Failed password for invalid user c6h12o6 from 81.134.41.100 port 58652 ssh2
...
2019-10-22 18:20:18
198.12.154.22 attack
$f2bV_matches
2019-10-22 18:12:13
192.169.250.203 attackspam
$f2bV_matches
2019-10-22 18:36:31
129.211.80.201 attack
Automatic report - Banned IP Access
2019-10-22 18:19:08
178.73.215.171 attack
[connect count:2 time(s)][SMTP/25/465/587 Probe]

in blocklist.de:"listed [mail]"
in spfbl.net:"listed"
*(10221154)
2019-10-22 18:30:32
164.132.56.243 attack
2019-10-22T09:42:01.780677  sshd[22806]: Invalid user p@ssw0rd123456 from 164.132.56.243 port 37912
2019-10-22T09:42:01.794854  sshd[22806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.243
2019-10-22T09:42:01.780677  sshd[22806]: Invalid user p@ssw0rd123456 from 164.132.56.243 port 37912
2019-10-22T09:42:04.104048  sshd[22806]: Failed password for invalid user p@ssw0rd123456 from 164.132.56.243 port 37912 ssh2
2019-10-22T09:45:52.957163  sshd[22905]: Invalid user mugging from 164.132.56.243 port 56688
...
2019-10-22 18:02:43

Recently Reported IPs

67.134.12.0 65.170.192.0 65.200.211.0 43.153.91.27
63.241.59.32 165.254.155.180 218.237.161.0 222.222.0.0
61.117.156.224 211.14.1.192 202.221.60.64 104.131.17.0
178.128.211.232 2606:4700:10::ac43:1784 2606:4700:10::6814:4517 36.141.117.84
57.141.14.112 31.141.117.84 206.189.62.190 2606:4700:10::6814:7230