Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.12.99.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25340
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.12.99.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 08:52:53 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 248.99.12.12.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 248.99.12.12.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
220.135.74.91 attackbotsspam
Port Scan: TCP/23
2019-09-02 23:35:52
66.194.27.57 attackbotsspam
Port Scan: TCP/445
2019-09-02 23:59:58
117.26.193.127 attackspam
Port Scan: TCP/34567
2019-09-02 23:48:48
107.173.191.114 attackspam
SMB Server BruteForce Attack
2019-09-02 22:38:01
187.189.51.131 attackspambots
Port Scan: TCP/81
2019-09-02 23:20:52
45.117.81.84 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-09-02 22:35:35
189.113.37.202 attack
Port Scan: TCP/34567
2019-09-02 23:42:34
67.78.37.154 attackbotsspam
Port Scan: UDP/137
2019-09-02 23:59:27
52.231.31.11 attack
Sep  2 13:15:26 MK-Soft-VM6 sshd\[28108\]: Invalid user 00local22 from 52.231.31.11 port 47930
Sep  2 13:15:26 MK-Soft-VM6 sshd\[28108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.31.11
Sep  2 13:15:29 MK-Soft-VM6 sshd\[28108\]: Failed password for invalid user 00local22 from 52.231.31.11 port 47930 ssh2
...
2019-09-02 23:01:57
151.61.72.136 attack
Port Scan: TCP/60001
2019-09-02 23:47:22
138.0.254.103 attackspambots
$f2bV_matches
2019-09-02 23:12:01
189.46.9.11 attackbotsspam
Port Scan: TCP/60001
2019-09-02 23:19:47
189.209.27.199 attackbotsspam
Port Scan: TCP/23
2019-09-02 23:41:58
218.22.206.178 attackspam
Automatic report - Banned IP Access
2019-09-02 22:43:25
79.103.133.30 attackbots
Port Scan: TCP/23
2019-09-02 23:26:33

Recently Reported IPs

247.19.116.188 157.25.229.68 207.98.78.148 64.188.77.119
186.219.57.59 153.15.63.255 59.86.123.134 248.218.171.12
25.180.107.169 50.134.226.2 207.164.151.230 68.129.27.242
45.137.227.43 47.236.234.12 66.238.221.222 163.202.107.45
69.155.224.141 74.212.44.103 139.49.92.127 223.226.108.162