Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.199.55.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.199.55.148.			IN	A

;; AUTHORITY SECTION:
.			371	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:25:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 148.55.199.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.55.199.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.214.21 attackspambots
Oct 25 05:51:26 srv206 sshd[29575]: Invalid user samba from 106.12.214.21
Oct 25 05:51:26 srv206 sshd[29575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.214.21
Oct 25 05:51:26 srv206 sshd[29575]: Invalid user samba from 106.12.214.21
Oct 25 05:51:28 srv206 sshd[29575]: Failed password for invalid user samba from 106.12.214.21 port 37260 ssh2
...
2019-10-25 16:32:22
222.186.175.167 attackbots
Oct 25 10:46:24 meumeu sshd[19302]: Failed password for root from 222.186.175.167 port 62862 ssh2
Oct 25 10:46:44 meumeu sshd[19302]: error: maximum authentication attempts exceeded for root from 222.186.175.167 port 62862 ssh2 [preauth]
Oct 25 10:46:55 meumeu sshd[19350]: Failed password for root from 222.186.175.167 port 16226 ssh2
...
2019-10-25 17:04:48
104.210.62.21 attackbotsspam
Oct 25 07:29:47 dedicated sshd[30774]: Invalid user francois123 from 104.210.62.21 port 29184
2019-10-25 16:38:12
61.28.156.239 attack
ENG,WP GET /wp-login.php
2019-10-25 16:58:12
101.37.42.175 attack
" "
2019-10-25 16:38:40
106.12.86.205 attack
SSH bruteforce (Triggered fail2ban)
2019-10-25 16:46:50
188.131.216.109 attack
2019-10-25T04:25:11.392204abusebot-3.cloudsearch.cf sshd\[5592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.216.109  user=root
2019-10-25 17:00:24
138.219.228.96 attackspam
Oct 25 06:15:12 localhost sshd\[13104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.228.96  user=root
Oct 25 06:15:14 localhost sshd\[13104\]: Failed password for root from 138.219.228.96 port 59904 ssh2
Oct 25 06:20:01 localhost sshd\[13546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.228.96  user=root
2019-10-25 16:33:31
210.139.49.38 attackbots
ENG,WP GET /wp-login.php
2019-10-25 16:57:42
190.86.253.178 attackspambots
445/tcp
[2019-10-25]1pkt
2019-10-25 16:32:58
72.43.141.7 attackspambots
SSH Bruteforce attack
2019-10-25 17:07:55
116.196.109.197 attackspam
2019-10-25T08:43:41.554546abusebot-5.cloudsearch.cf sshd\[1009\]: Invalid user jsr from 116.196.109.197 port 37690
2019-10-25 17:09:34
219.150.245.253 attackspam
firewall-block, port(s): 1433/tcp
2019-10-25 17:10:29
222.186.190.2 attack
DATE:2019-10-25 10:26:19, IP:222.186.190.2, PORT:ssh SSH brute force auth on honeypot server (honey-neo-dc-bis)
2019-10-25 16:40:30
115.159.203.199 attackspam
Oct 25 08:55:47 vpn01 sshd[30778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.203.199
Oct 25 08:55:49 vpn01 sshd[30778]: Failed password for invalid user 0racle9 from 115.159.203.199 port 46896 ssh2
...
2019-10-25 16:46:25

Recently Reported IPs

12.20.237.195 12.20.241.112 12.228.171.20 12.228.171.8
12.228.171.26 12.228.228.227 12.228.171.28 12.228.207.66
12.228.171.22 12.228.171.4 12.228.202.165 12.228.218.1
12.229.200.163 12.228.171.6 12.229.208.159 12.229.217.226
12.230.209.6 12.23.153.146 12.230.130.221 12.23.222.90