Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.122.133.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8664
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.122.133.202.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 14:09:27 CST 2025
;; MSG SIZE  rcvd: 107
Host info
202.133.122.12.in-addr.arpa domain name pointer cr83.cgcil.ip.att.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
202.133.122.12.in-addr.arpa	name = cr83.cgcil.ip.att.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.72.145.211 attack
Port probing on unauthorized port 23
2020-05-27 18:33:30
106.12.94.186 attack
$f2bV_matches
2020-05-27 19:12:00
195.254.135.76 attackbotsspam
May 27 08:37:49 vpn01 sshd[18686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.254.135.76
May 27 08:37:51 vpn01 sshd[18686]: Failed password for invalid user tech from 195.254.135.76 port 35173 ssh2
...
2020-05-27 18:33:13
195.54.167.120 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-27 18:45:40
220.134.240.155 attackbotsspam
 TCP (SYN) 220.134.240.155:63182 -> port 23, len 44
2020-05-27 19:01:37
156.96.118.172 attackspam
May 27 03:48:43 nopemail postfix/smtpd[20823]: NOQUEUE: reject: RCPT from unknown[156.96.118.172]: 554 5.7.1 : Relay access denied; from= to= proto=ESMTP helo=
...
2020-05-27 18:53:16
37.49.226.62 attackspambots
 TCP (SYN) 37.49.226.62:37664 -> port 22, len 48
2020-05-27 18:59:27
117.212.149.90 attack
20/5/26@23:48:46: FAIL: Alarm-Intrusion address from=117.212.149.90
...
2020-05-27 18:52:15
94.102.56.215 attack
SIP/5060 Probe, BF, Hack -
2020-05-27 18:56:14
183.88.243.109 attackbotsspam
$f2bV_matches
2020-05-27 19:12:46
198.108.67.116 attack
4506/tcp 4506/tcp 4506/tcp...
[2020-04-30/05-27]7pkt,1pt.(tcp)
2020-05-27 18:40:06
141.98.80.46 attackbots
May 27 11:01:24 mail.srvfarm.net postfix/smtps/smtpd[1566508]: warning: unknown[141.98.80.46]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 27 11:01:24 mail.srvfarm.net postfix/smtps/smtpd[1566508]: lost connection after AUTH from unknown[141.98.80.46]
May 27 11:01:29 mail.srvfarm.net postfix/smtps/smtpd[1566508]: lost connection after AUTH from unknown[141.98.80.46]
May 27 11:01:34 mail.srvfarm.net postfix/smtps/smtpd[1566581]: lost connection after AUTH from unknown[141.98.80.46]
May 27 11:01:40 mail.srvfarm.net postfix/smtps/smtpd[1566508]: lost connection after AUTH from unknown[141.98.80.46]
2020-05-27 19:04:54
2.187.91.14 attackspambots
port scan and connect, tcp 23 (telnet)
2020-05-27 18:37:58
95.177.173.99 attackspambots
May 27 02:26:53 propaganda sshd[10221]: Connection from 95.177.173.99 port 56078 on 10.0.0.161 port 22 rdomain ""
May 27 02:26:53 propaganda sshd[10221]: Connection closed by 95.177.173.99 port 56078 [preauth]
2020-05-27 19:10:59
117.2.123.160 attack
Unauthorized connection attempt detected from IP address 117.2.123.160 to port 445
2020-05-27 18:58:55

Recently Reported IPs

93.15.234.145 51.210.113.127 133.116.236.74 187.185.142.47
32.95.155.208 195.163.20.89 227.108.0.179 88.27.222.46
37.167.74.71 251.248.184.55 203.184.185.38 116.30.3.170
62.205.60.33 3.135.186.199 115.71.133.193 196.34.252.13
169.121.226.29 251.164.50.69 249.107.220.130 99.182.185.196