Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       12.0.0.0 - 12.255.255.255
CIDR:           12.0.0.0/8
NetName:        ATT
NetHandle:      NET-12-0-0-0-1
Parent:         NET12 (NET-12-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   AT&T Enterprises, LLC (AEL-360)
RegDate:        1983-08-23
Updated:        2025-12-02
Comment:        IP assignments within this IP Block range are STATIC, not dynamic.
Ref:            https://rdap.arin.net/registry/ip/12.0.0.0



OrgName:        AT&T Enterprises, LLC
OrgId:          AEL-360
Address:        208 S. Akard St.
City:           Dallas
StateProv:      TX
PostalCode:     75202
Country:        US
RegDate:        2024-11-22
Updated:        2025-10-29
Ref:            https://rdap.arin.net/registry/entity/AEL-360


OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName:   Routing POC
OrgRoutingPhone:  +1-999-999-9999 
OrgRoutingEmail:  routing_poc@att.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI59-ARIN

OrgTechHandle: ZS44-ARIN
OrgTechName:   IPAdmin-ATT Internet Services
OrgTechPhone:  +1-888-510-5545 
OrgTechEmail:  ipadmin@semail.att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZS44-ARIN

OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-919-319-8167 
OrgAbuseEmail:  abuse@att.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName:   IP Team
OrgTechPhone:  +1-888-876-2382 
OrgTechEmail:  rm-ipspecialist@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ICC-ARIN

# end


# start

NetRange:       12.12.112.0 - 12.12.127.255
CIDR:           12.12.112.0/20
NetName:        NET3-INC457-112
NetHandle:      NET-12-12-112-0-1
Parent:         ATT (NET-12-0-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       NET3 INC (C11333821)
RegDate:        2025-08-28
Updated:        2025-08-28
Ref:            https://rdap.arin.net/registry/ip/12.12.112.0


CustName:       NET3 INC
Address:        1 SUMMER ST
City:           BOSTON
StateProv:      MA
PostalCode:     02110
Country:        US
RegDate:        2025-08-28
Updated:        2025-08-28
Ref:            https://rdap.arin.net/registry/entity/C11333821

OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName:   Routing POC
OrgRoutingPhone:  +1-999-999-9999 
OrgRoutingEmail:  routing_poc@att.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI59-ARIN

OrgTechHandle: ZS44-ARIN
OrgTechName:   IPAdmin-ATT Internet Services
OrgTechPhone:  +1-888-510-5545 
OrgTechEmail:  ipadmin@semail.att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZS44-ARIN

OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-919-319-8167 
OrgAbuseEmail:  abuse@att.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName:   IP Team
OrgTechPhone:  +1-888-876-2382 
OrgTechEmail:  rm-ipspecialist@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ICC-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.12.114.236
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12476
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.12.114.236.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042600 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 17:50:54 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 236.114.12.12.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 12.12.114.236.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
2.186.14.7 attackbots
Unauthorized connection attempt detected from IP address 2.186.14.7 to port 85
2019-12-29 16:55:40
51.38.231.249 attack
Dec 29 07:28:15 * sshd[30886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.231.249
Dec 29 07:28:17 * sshd[30886]: Failed password for invalid user hepler from 51.38.231.249 port 46394 ssh2
2019-12-29 16:51:14
180.150.176.130 attack
Unauthorized connection attempt detected from IP address 180.150.176.130 to port 139
2019-12-29 17:06:46
200.95.184.2 attack
Unauthorized connection attempt detected from IP address 200.95.184.2 to port 1433
2019-12-29 16:27:32
185.176.56.101 attackspam
Unauthorized connection attempt detected from IP address 185.176.56.101 to port 80
2019-12-29 17:03:39
121.164.57.27 attackbots
Dec 29 09:13:27 server sshd\[18475\]: Invalid user silano from 121.164.57.27
Dec 29 09:13:27 server sshd\[18475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.164.57.27 
Dec 29 09:13:29 server sshd\[18475\]: Failed password for invalid user silano from 121.164.57.27 port 58110 ssh2
Dec 29 09:28:17 server sshd\[21537\]: Invalid user silano from 121.164.57.27
Dec 29 09:28:17 server sshd\[21537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.164.57.27 
...
2019-12-29 16:40:13
175.203.248.150 attackbotsspam
Unauthorized connection attempt detected from IP address 175.203.248.150 to port 23
2019-12-29 17:10:17
138.121.100.90 attackspam
Unauthorized connection attempt detected from IP address 138.121.100.90 to port 445
2019-12-29 16:38:27
185.216.140.70 attackspam
Unauthorized connection attempt detected from IP address 185.216.140.70 to port 3393
2019-12-29 17:03:15
197.211.35.163 attackspam
Unauthorized connection attempt detected from IP address 197.211.35.163 to port 445
2019-12-29 16:28:38
61.75.96.9 attackspam
Unauthorized connection attempt detected from IP address 61.75.96.9 to port 5555
2019-12-29 16:50:29
149.12.217.240 attack
Unauthorized connection attempt detected from IP address 149.12.217.240 to port 23
2019-12-29 16:36:59
85.158.37.52 attackspambots
Unauthorized connection attempt detected from IP address 85.158.37.52 to port 23
2019-12-29 16:47:05
185.108.164.178 attackbots
Unauthorized connection attempt detected from IP address 185.108.164.178 to port 23
2019-12-29 17:04:13
187.142.55.173 attack
Unauthorized connection attempt detected from IP address 187.142.55.173 to port 81
2019-12-29 17:02:22

Recently Reported IPs

109.162.246.68 36.104.135.44 211.231.30.147 45.148.10.21
120.27.149.138 2606:4700:10::6816:2575 82.139.205.2 134.35.157.29
122.192.203.30 2606:4700:10::6814:9224 180.219.206.182 77.238.137.103
74.7.243.207 176.65.139.177 2606:4700:10::6814:6404 2606:4700:10::ac43:2367
2606:4700:10::6814:5524 2606:4700:10::6814:7468 223.160.232.206 205.185.116.229