Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amboy

Region: Indiana

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.229.83.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32450
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.229.83.149.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100702 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 08 09:13:09 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 149.83.229.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.83.229.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.219.187.68 attackspambots
Jun 24 06:49:40 server sshd[56309]: Failed password for invalid user openhabian from 92.219.187.68 port 36454 ssh2
Jun 24 06:50:19 server sshd[56328]: Failed password for invalid user admin from 92.219.187.68 port 48546 ssh2
Jun 24 06:50:57 server sshd[56627]: Failed password for invalid user super from 92.219.187.68 port 60790 ssh2
2019-06-24 16:33:02
14.161.19.98 attackspambots
Automatic report - Web App Attack
2019-06-24 17:08:38
59.152.100.214 attackbotsspam
Telnet Server BruteForce Attack
2019-06-24 16:41:57
162.243.137.229 attackspam
¯\_(ツ)_/¯
2019-06-24 16:54:20
91.82.92.50 attack
20 attempts against mh-ssh on mist.magehost.pro
2019-06-24 17:04:36
87.121.77.67 attack
Mail sent to address hacked/leaked from Destructoid
2019-06-24 17:08:59
84.235.87.241 attackbotsspam
19/6/24@00:51:00: FAIL: Alarm-Intrusion address from=84.235.87.241
...
2019-06-24 16:32:30
209.17.96.82 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-24 16:46:05
156.198.252.47 attack
firewall-block, port(s): 23/tcp
2019-06-24 16:53:27
218.92.0.139 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.139  user=root
Failed password for root from 218.92.0.139 port 62001 ssh2
Failed password for root from 218.92.0.139 port 62001 ssh2
Failed password for root from 218.92.0.139 port 62001 ssh2
Failed password for root from 218.92.0.139 port 62001 ssh2
2019-06-24 16:38:04
5.196.201.99 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-24 16:47:32
69.135.100.82 attackspam
Jun 24 06:46:54 vserver sshd\[15051\]: Invalid user mongodb from 69.135.100.82Jun 24 06:46:57 vserver sshd\[15051\]: Failed password for invalid user mongodb from 69.135.100.82 port 35974 ssh2Jun 24 06:48:57 vserver sshd\[15070\]: Invalid user public from 69.135.100.82Jun 24 06:48:59 vserver sshd\[15070\]: Failed password for invalid user public from 69.135.100.82 port 55370 ssh2
...
2019-06-24 17:21:24
45.77.196.124 attack
WordPress login Brute force / Web App Attack on client site.
2019-06-24 16:37:44
176.32.230.29 attackspambots
xmlrpc attack
2019-06-24 16:49:40
180.167.155.237 attackspambots
Jun 24 07:11:24 s64-1 sshd[23510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.155.237
Jun 24 07:11:26 s64-1 sshd[23510]: Failed password for invalid user marco from 180.167.155.237 port 51356 ssh2
Jun 24 07:12:59 s64-1 sshd[23541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.155.237
...
2019-06-24 17:18:45

Recently Reported IPs

82.6.165.225 162.157.224.138 121.235.194.27 63.236.3.6
24.182.206.194 89.135.44.218 112.242.176.164 60.90.20.12
151.67.77.156 79.200.173.255 110.86.154.22 1.145.124.28
87.35.0.230 124.183.166.225 41.193.67.210 58.238.198.94
63.42.164.68 143.210.180.18 71.250.21.40 31.127.103.11