Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.98.239.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.98.239.109.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081001 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Aug 11 09:13:31 CST 2020
;; MSG SIZE  rcvd: 117
Host info
109.239.98.12.in-addr.arpa domain name pointer 109.mupb.atln.nrcrgais.dsl.att.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.239.98.12.in-addr.arpa	name = 109.mupb.atln.nrcrgais.dsl.att.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.77.19.139 attackspambots
Automatic report - Port Scan Attack
2019-07-19 00:32:37
128.199.83.103 attack
[ssh] SSH attack
2019-07-19 00:27:49
90.9.87.100 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-19 00:28:13
68.192.131.73 attackspam
Honeypot attack, port: 5555, PTR: ool-44c08349.dyn.optonline.net.
2019-07-19 00:37:46
36.236.234.100 attackspam
Honeypot attack, port: 5555, PTR: 36-236-234-100.dynamic-ip.hinet.net.
2019-07-18 23:38:49
1.217.98.44 attack
Unauthorized SSH login attempts
2019-07-19 00:39:11
93.180.24.254 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 09:04:07,952 INFO [amun_request_handler] PortScan Detected on Port: 445 (93.180.24.254)
2019-07-19 00:24:56
45.249.49.110 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 08:17:41,274 INFO [amun_request_handler] PortScan Detected on Port: 445 (45.249.49.110)
2019-07-19 00:14:22
179.97.38.190 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 12:45:59,437 INFO [amun_request_handler] PortScan Detected on Port: 445 (179.97.38.190)
2019-07-19 00:17:28
93.174.93.191 attackbots
Honeypot attack, port: 5555, PTR: no-reverse-dns-configured.com.
2019-07-19 00:45:55
51.77.146.136 attackspam
Failed password for invalid user webcam from 51.77.146.136 port 47826 ssh2
Invalid user teste from 51.77.146.136 port 45184
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.136
Failed password for invalid user teste from 51.77.146.136 port 45184 ssh2
Invalid user vaibhav from 51.77.146.136 port 42552
2019-07-19 00:13:48
2.50.13.170 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 07:50:54,580 INFO [amun_request_hest_handler] PortScan Detected on Port: 445 (2.50.13.170)
2019-07-19 00:34:04
45.230.28.12 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 11:10:21,370 INFO [amun_request_handler] PortScan Detected on Port: 445 (45.230.28.12)
2019-07-19 00:21:30
152.168.117.159 attackbotsspam
Jul 18 14:47:22 microserver sshd[2460]: Invalid user inspur from 152.168.117.159 port 54454
Jul 18 14:47:22 microserver sshd[2460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.117.159
Jul 18 14:47:24 microserver sshd[2460]: Failed password for invalid user inspur from 152.168.117.159 port 54454 ssh2
Jul 18 14:53:53 microserver sshd[3291]: Invalid user jie from 152.168.117.159 port 54543
Jul 18 14:53:53 microserver sshd[3291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.117.159
Jul 18 15:44:13 microserver sshd[10548]: Invalid user elasticsearch from 152.168.117.159 port 48233
Jul 18 15:44:13 microserver sshd[10548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.117.159
Jul 18 15:44:15 microserver sshd[10548]: Failed password for invalid user elasticsearch from 152.168.117.159 port 48233 ssh2
Jul 18 15:50:30 microserver sshd[11703]: Invalid user rogerio from 1
2019-07-19 00:11:19
91.135.194.190 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-19 00:23:18

Recently Reported IPs

175.71.18.32 98.189.210.244 217.23.68.30 172.72.117.58
24.101.208.75 109.143.168.211 189.66.58.242 80.88.60.186
149.171.22.161 110.33.9.215 174.209.10.20 100.201.243.180
211.239.90.186 18.156.104.224 182.20.225.18 94.104.106.71
75.164.241.73 146.51.28.171 149.232.151.2 154.255.118.162