Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chicago

Region: Illinois

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       12.0.0.0 - 12.255.255.255
CIDR:           12.0.0.0/8
NetName:        ATT
NetHandle:      NET-12-0-0-0-1
Parent:         NET12 (NET-12-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   AT&T Enterprises, LLC (AEL-360)
RegDate:        1983-08-23
Updated:        2025-12-02
Comment:        IP assignments within this IP Block range are STATIC, not dynamic.
Ref:            https://rdap.arin.net/registry/ip/12.0.0.0



OrgName:        AT&T Enterprises, LLC
OrgId:          AEL-360
Address:        208 S. Akard St.
City:           Dallas
StateProv:      TX
PostalCode:     75202
Country:        US
RegDate:        2024-11-22
Updated:        2025-10-29
Ref:            https://rdap.arin.net/registry/entity/AEL-360


OrgTechHandle: ZS44-ARIN
OrgTechName:   IPAdmin-ATT Internet Services
OrgTechPhone:  +1-888-510-5545 
OrgTechEmail:  ipadmin@semail.att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZS44-ARIN

OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-919-319-8167 
OrgAbuseEmail:  abuse@att.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7-ARIN

OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName:   Routing POC
OrgRoutingPhone:  +1-999-999-9999 
OrgRoutingEmail:  routing_poc@att.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI59-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName:   IP Team
OrgTechPhone:  +1-888-876-2382 
OrgTechEmail:  rm-ipspecialist@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ICC-ARIN

# end


# start

NetRange:       12.56.0.0 - 12.57.255.255
CIDR:           12.56.0.0/15
NetName:        ATTSVC-12-56-0-0
NetHandle:      NET-12-56-0-0-1
Parent:         ATT (NET-12-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   AT&T Services, Inc. (ATTW)
RegDate:        2003-12-08
Updated:        2003-12-08
Comment:        For abuse issues contact abuse@att.net.
Ref:            https://rdap.arin.net/registry/ip/12.56.0.0


OrgName:        AT&T Services, Inc.
OrgId:          ATTW
Address:        200 S. Laurel AVE.
City:           MIDDLETOWN
StateProv:      NJ
PostalCode:     07748
Country:        US
RegDate:        
Updated:        2024-11-25
Comment:        Contact AT&T Abuse ( abuse@att.net ) for policy abuse issues.
Comment:        All policy abuse issues sent to other POCs will be disregarded.
Ref:            https://rdap.arin.net/registry/entity/ATTW


OrgTechHandle: IPSWI-ARIN
OrgTechName:   IP SWIP
OrgTechPhone:  +1-888-613-6330 
OrgTechEmail:  swipid@icorefep1.ims.att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPSWI-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName:   IP Team
OrgTechPhone:  +1-888-876-2382 
OrgTechEmail:  rm-ipspecialist@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ICC-ARIN

OrgAbuseHandle: ATTAB-ARIN
OrgAbuseName:   ATT Abuse
OrgAbusePhone:  +1-999-999-9999 
OrgAbuseEmail:  abuse@att.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ATTAB-ARIN

OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName:   Routing POC
OrgRoutingPhone:  +1-999-999-9999 
OrgRoutingEmail:  routing_poc@att.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI59-ARIN

RTechHandle: IPSWI-ARIN
RTechName:   IP SWIP
RTechPhone:  +1-888-613-6330 
RTechEmail:  swipid@icorefep1.ims.att.com
RTechRef:    https://rdap.arin.net/registry/entity/IPSWI-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.57.177.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62946
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.57.177.62.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 10:08:31 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 62.177.57.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 62.177.57.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.204 attack
2019-09-01T18:39:01.880433abusebot-8.cloudsearch.cf sshd\[520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2019-09-02 03:07:28
2.201.94.74 attack
SSH Server BruteForce Attack
2019-09-02 03:04:05
2001:41d0:8:6a50:: attackbots
Wordpress attack
2019-09-02 03:35:14
113.10.156.189 attackspam
Sep  1 19:30:13 root sshd[13664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.10.156.189 
Sep  1 19:30:15 root sshd[13664]: Failed password for invalid user admin from 113.10.156.189 port 56246 ssh2
Sep  1 19:35:23 root sshd[13694]: Failed password for root from 113.10.156.189 port 44652 ssh2
...
2019-09-02 03:33:38
27.0.141.4 attack
2019-09-01T19:10:37.743355abusebot-3.cloudsearch.cf sshd\[24489\]: Invalid user 123 from 27.0.141.4 port 36720
2019-09-02 03:37:26
45.119.83.62 attackspam
Sep  1 21:01:31 vpn01 sshd\[7534\]: Invalid user herbert from 45.119.83.62
Sep  1 21:01:31 vpn01 sshd\[7534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.62
Sep  1 21:01:33 vpn01 sshd\[7534\]: Failed password for invalid user herbert from 45.119.83.62 port 36332 ssh2
2019-09-02 03:26:03
122.152.218.213 attackspambots
Sep  1 20:49:06 SilenceServices sshd[23930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.218.213
Sep  1 20:49:08 SilenceServices sshd[23930]: Failed password for invalid user shania from 122.152.218.213 port 63703 ssh2
Sep  1 20:53:43 SilenceServices sshd[27442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.218.213
2019-09-02 03:07:08
221.199.189.162 attack
Sep  1 21:13:21 v22019058497090703 sshd[7506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.199.189.162
Sep  1 21:13:23 v22019058497090703 sshd[7506]: Failed password for invalid user jeronimo from 221.199.189.162 port 45334 ssh2
Sep  1 21:16:53 v22019058497090703 sshd[7772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.199.189.162
...
2019-09-02 03:17:23
192.117.186.215 attackspambots
Automatic report - Banned IP Access
2019-09-02 03:11:53
140.143.45.22 attackspambots
Sep  1 20:25:36 vps691689 sshd[23825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.45.22
Sep  1 20:25:38 vps691689 sshd[23825]: Failed password for invalid user loki from 140.143.45.22 port 58494 ssh2
...
2019-09-02 03:05:19
187.75.55.44 attackbots
Sep  1 09:14:12 web9 sshd\[20586\]: Invalid user agarwal from 187.75.55.44
Sep  1 09:14:12 web9 sshd\[20586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.75.55.44
Sep  1 09:14:14 web9 sshd\[20586\]: Failed password for invalid user agarwal from 187.75.55.44 port 49280 ssh2
Sep  1 09:20:00 web9 sshd\[21812\]: Invalid user ftp_user from 187.75.55.44
Sep  1 09:20:00 web9 sshd\[21812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.75.55.44
2019-09-02 03:26:59
221.226.28.244 attack
Sep  1 18:43:19 game-panel sshd[10302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.28.244
Sep  1 18:43:22 game-panel sshd[10302]: Failed password for invalid user diddy from 221.226.28.244 port 5959 ssh2
Sep  1 18:47:37 game-panel sshd[10459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.28.244
2019-09-02 03:01:30
115.238.88.5 attackbots
Sep  1 20:45:16 vps691689 sshd[24425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.88.5
Sep  1 20:45:17 vps691689 sshd[24425]: Failed password for invalid user mn from 115.238.88.5 port 37310 ssh2
Sep  1 20:49:49 vps691689 sshd[24560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.88.5
...
2019-09-02 02:55:49
45.82.153.37 attack
Sep  1 20:10:36 mail postfix/smtpd\[3457\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed: \
Sep  1 20:41:30 mail postfix/smtpd\[3509\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed: \
Sep  1 20:41:42 mail postfix/smtpd\[5065\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed: \
Sep  1 20:49:58 mail postfix/smtpd\[5127\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed: \
2019-09-02 03:01:55
85.105.240.117 attackbotsspam
Telnet Server BruteForce Attack
2019-09-02 02:55:24

Recently Reported IPs

118.63.230.32 66.102.189.240 74.126.83.120 207.40.26.225
192.128.254.104 172.21.135.90 128.1.253.9 146.124.184.66
119.13.61.12 10.133.174.137 2606:4700:10::6816:1903 2606:4700:10::ac43:2398
2606:4700:10::6814:9396 2606:4700:10::6814:6181 2606:4700:10::6816:894 2606:4700:10::6816:2054
2606:4700:10::ac43:1010 2606:4700:10::6814:4963 118.55.26.156 103.208.33.229