Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aiken

Region: South Carolina

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.69.131.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.69.131.140.			IN	A

;; AUTHORITY SECTION:
.			487	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021902 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 11:20:47 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 140.131.69.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.131.69.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.36.16.214 attackbotsspam
2019-12-08T14:56:31.980323beta postfix/smtpd[9264]: NOQUEUE: reject: RCPT from 78-36-16-214.dynamic.murmansk.dslavangard.ru[78.36.16.214]: 554 5.7.1 Service unavailable; Client host [78.36.16.214] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/78.36.16.214; from= to= proto=ESMTP helo=<78-36-16-214.dynamic.murmansk.dslavangard.ru>
...
2019-12-08 23:00:00
113.132.183.61 attack
Scanning
2019-12-08 22:43:46
222.186.180.223 attackbots
Dec  8 14:40:30 v22018086721571380 sshd[19842]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 45276 ssh2 [preauth]
Dec  8 15:49:50 v22018086721571380 sshd[24688]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 63364 ssh2 [preauth]
2019-12-08 22:51:51
83.13.209.154 attackspambots
Dec  8 04:50:22 wbs sshd\[26096\]: Invalid user olmedo from 83.13.209.154
Dec  8 04:50:22 wbs sshd\[26096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fib154.internetdsl.tpnet.pl
Dec  8 04:50:24 wbs sshd\[26096\]: Failed password for invalid user olmedo from 83.13.209.154 port 48922 ssh2
Dec  8 04:56:24 wbs sshd\[26645\]: Invalid user test from 83.13.209.154
Dec  8 04:56:24 wbs sshd\[26645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fib154.internetdsl.tpnet.pl
2019-12-08 23:11:42
217.182.158.104 attack
Dec  8 12:39:25 minden010 sshd[25779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.158.104
Dec  8 12:39:28 minden010 sshd[25779]: Failed password for invalid user bbbbbbb from 217.182.158.104 port 45017 ssh2
Dec  8 12:44:42 minden010 sshd[28976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.158.104
...
2019-12-08 22:39:50
78.46.36.203 attack
UTC: 2019-12-07 port: 123/udp
2019-12-08 22:42:03
129.204.78.236 attackspambots
2019-12-08T14:23:04.815232abusebot.cloudsearch.cf sshd\[23591\]: Invalid user mago from 129.204.78.236 port 36076
2019-12-08 22:50:48
218.66.59.124 attack
Dec  8 19:56:30 gw1 sshd[7645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.66.59.124
Dec  8 19:56:32 gw1 sshd[7645]: Failed password for invalid user pak from 218.66.59.124 port 46465 ssh2
...
2019-12-08 23:01:17
222.186.173.215 attackbotsspam
--- report ---
Dec  8 09:44:53 sshd: Connection from 222.186.173.215 port 47800
Dec  8 09:45:00 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Dec  8 09:45:02 sshd: Failed password for root from 222.186.173.215 port 47800 ssh2
Dec  8 09:45:03 sshd: Received disconnect from 222.186.173.215: 11:  [preauth]
2019-12-08 23:15:45
222.186.180.17 attackspam
Dec  8 20:29:31 vibhu-HP-Z238-Microtower-Workstation sshd\[7157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Dec  8 20:29:33 vibhu-HP-Z238-Microtower-Workstation sshd\[7157\]: Failed password for root from 222.186.180.17 port 33962 ssh2
Dec  8 20:29:36 vibhu-HP-Z238-Microtower-Workstation sshd\[7157\]: Failed password for root from 222.186.180.17 port 33962 ssh2
Dec  8 20:29:39 vibhu-HP-Z238-Microtower-Workstation sshd\[7157\]: Failed password for root from 222.186.180.17 port 33962 ssh2
Dec  8 20:29:43 vibhu-HP-Z238-Microtower-Workstation sshd\[7157\]: Failed password for root from 222.186.180.17 port 33962 ssh2
...
2019-12-08 23:13:17
188.35.20.144 attackspambots
[portscan] Port scan
2019-12-08 22:44:34
128.199.54.252 attackspambots
2019-12-08T14:41:10.789836shield sshd\[24480\]: Invalid user guest from 128.199.54.252 port 40286
2019-12-08T14:41:10.794848shield sshd\[24480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.54.252
2019-12-08T14:41:13.070636shield sshd\[24480\]: Failed password for invalid user guest from 128.199.54.252 port 40286 ssh2
2019-12-08T14:46:24.815783shield sshd\[25969\]: Invalid user bing from 128.199.54.252 port 48480
2019-12-08T14:46:24.819828shield sshd\[25969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.54.252
2019-12-08 22:55:47
180.76.141.184 attack
SSH Brute Force, server-1 sshd[1719]: Failed password for root from 180.76.141.184 port 35782 ssh2
2019-12-08 23:24:33
202.51.74.189 attackspambots
Dec  8 09:32:55 vps647732 sshd[23447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
Dec  8 09:32:57 vps647732 sshd[23447]: Failed password for invalid user minck from 202.51.74.189 port 48500 ssh2
...
2019-12-08 22:48:04
119.29.199.150 attackspambots
2019-12-08T09:48:30.589844ns547587 sshd\[7249\]: Invalid user molly from 119.29.199.150 port 35340
2019-12-08T09:48:30.594656ns547587 sshd\[7249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.199.150
2019-12-08T09:48:32.604782ns547587 sshd\[7249\]: Failed password for invalid user molly from 119.29.199.150 port 35340 ssh2
2019-12-08T09:56:23.083721ns547587 sshd\[20322\]: Invalid user squid from 119.29.199.150 port 43868
...
2019-12-08 23:10:32

Recently Reported IPs

20.61.86.192 66.54.95.107 200.15.104.58 220.224.180.30
158.63.253.220 175.192.22.63 201.211.81.215 112.179.145.59
186.11.29.82 249.62.68.66 46.34.227.110 43.253.147.179
188.170.62.63 58.174.136.176 248.41.183.158 11.62.45.71
36.186.131.60 200.26.91.89 37.10.45.162 195.168.227.106