Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.240.69.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7610
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.240.69.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:26:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 81.69.240.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.69.240.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
149.129.225.57 attackbotsspam
Unauthorised access (Aug 11) SRC=149.129.225.57 LEN=40 TTL=48 ID=27455 TCP DPT=8080 WINDOW=18254 SYN
2019-08-12 05:21:55
5.189.160.177 attackbotsspam
Aug 11 22:44:17 plex sshd[24048]: Invalid user wwwrun from 5.189.160.177 port 59398
2019-08-12 04:53:32
177.84.90.251 attackspambots
Automatic report - Port Scan Attack
2019-08-12 04:59:24
190.227.182.218 attackbots
2019-08-11T20:12:31.131419mail01 postfix/smtpd[21288]: warning: host218.190-227-182.telecom.net.ar[190.227.182.218]: SASL PLAIN authentication failed:
2019-08-11T20:12:37.173999mail01 postfix/smtpd[21288]: warning: host218.190-227-182.telecom.net.ar[190.227.182.218]: SASL PLAIN authentication failed:
2019-08-11T20:12:47.209714mail01 postfix/smtpd[21288]: warning: host218.190-227-182.telecom.net.ar[190.227.182.218]: SASL PLAIN authentication failed:
2019-08-12 04:48:47
154.125.226.105 attack
TCP src-port=50642   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (612)
2019-08-12 05:23:03
203.159.249.215 attack
Aug 11 20:27:51 SilenceServices sshd[20113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.159.249.215
Aug 11 20:27:53 SilenceServices sshd[20113]: Failed password for invalid user ftpuser from 203.159.249.215 port 36706 ssh2
Aug 11 20:33:03 SilenceServices sshd[23101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.159.249.215
2019-08-12 05:00:31
91.226.140.54 attackspambots
TCP src-port=46686   dst-port=25    dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (611)
2019-08-12 05:25:48
46.229.168.133 attackspambots
46.229.168.133 - - \[11/Aug/2019:19:44:32 +0200\] "GET /index.php\?printable=yes\&returnto=Discussion%2Bcat%C3%A9gorie%3AEggdrop\&returntoquery=oldid%3D1392\&title=Sp%C3%A9cial%3AConnexion HTTP/1.1" 200 4026 "-" "Mozilla/5.0 \(compatible\; SemrushBot/3\~bl\; +http://www.semrush.com/bot.html\)"
46.229.168.133 - - \[11/Aug/2019:20:11:31 +0200\] "GET /showthread.php\?mode=linear\&pid=10461\&tid=1447 HTTP/1.1" 302 5 "-" "Mozilla/5.0 \(compatible\; SemrushBot/3\~bl\; +http://www.semrush.com/bot.html\)"
2019-08-12 04:50:58
51.83.42.244 attackspambots
Unauthorized SSH login attempts
2019-08-12 05:12:30
156.204.166.0 attack
scan z
2019-08-12 04:53:50
114.115.165.45 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2019-08-12 04:44:21
185.220.102.4 attackspambots
Aug 11 21:07:52 minden010 sshd[17182]: Failed password for root from 185.220.102.4 port 45735 ssh2
Aug 11 21:07:55 minden010 sshd[17182]: Failed password for root from 185.220.102.4 port 45735 ssh2
Aug 11 21:08:03 minden010 sshd[17182]: Failed password for root from 185.220.102.4 port 45735 ssh2
Aug 11 21:08:06 minden010 sshd[17182]: Failed password for root from 185.220.102.4 port 45735 ssh2
Aug 11 21:08:06 minden010 sshd[17182]: error: maximum authentication attempts exceeded for root from 185.220.102.4 port 45735 ssh2 [preauth]
...
2019-08-12 04:58:51
187.22.234.218 attackspam
" "
2019-08-12 05:11:18
165.227.16.222 attackspam
2019-08-11T22:22:36.287756  sshd[4403]: Invalid user llama from 165.227.16.222 port 41808
2019-08-11T22:22:36.302545  sshd[4403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.16.222
2019-08-11T22:22:36.287756  sshd[4403]: Invalid user llama from 165.227.16.222 port 41808
2019-08-11T22:22:38.671933  sshd[4403]: Failed password for invalid user llama from 165.227.16.222 port 41808 ssh2
2019-08-11T22:26:39.927485  sshd[4430]: Invalid user tibco from 165.227.16.222 port 33868
...
2019-08-12 05:19:22
158.69.192.239 attack
$f2bV_matches
2019-08-12 05:05:48

Recently Reported IPs

129.2.226.57 181.238.41.190 232.206.213.6 177.248.50.30
191.15.5.137 66.219.107.146 198.44.109.14 252.179.171.185
48.222.61.133 73.227.81.145 40.14.32.52 29.232.251.93
92.252.180.13 25.211.230.201 16.138.44.199 22.253.51.89
62.195.0.249 226.108.109.217 239.209.11.202 182.123.111.59