Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.99.5.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60022
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.99.5.64.			IN	A

;; AUTHORITY SECTION:
.			404	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052800 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 28 14:56:56 CST 2023
;; MSG SIZE  rcvd: 103
Host info
64.5.99.12.in-addr.arpa domain name pointer 64.mufc.snfc.snfccafj.dsl.att.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
64.5.99.12.in-addr.arpa	name = 64.mufc.snfc.snfccafj.dsl.att.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.143.222.174 attackbots
(pop3d) Failed POP3 login from 45.143.222.174 (NL/Netherlands/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 14 22:54:49 ir1 dovecot[2885757]: pop3-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=45.143.222.174, lip=5.63.12.44, session=
2020-07-15 07:52:56
220.88.1.208 attackspambots
Invalid user zhaoxu from 220.88.1.208 port 55893
2020-07-15 07:43:31
67.205.137.32 attackbots
SSH Login Bruteforce
2020-07-15 07:42:36
85.209.48.228 attackspam
(sshd) Failed SSH login from 85.209.48.228 (DE/Germany/knr-party.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 15 02:16:35 s1 sshd[32258]: Invalid user matt from 85.209.48.228 port 47742
Jul 15 02:16:37 s1 sshd[32258]: Failed password for invalid user matt from 85.209.48.228 port 47742 ssh2
Jul 15 02:44:51 s1 sshd[839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.48.228  user=ftp
Jul 15 02:44:52 s1 sshd[839]: Failed password for ftp from 85.209.48.228 port 36494 ssh2
Jul 15 02:59:11 s1 sshd[1278]: Invalid user postgres from 85.209.48.228 port 42620
2020-07-15 08:02:06
203.106.41.157 attackbotsspam
Invalid user fabiana from 203.106.41.157 port 47976
2020-07-15 08:12:52
89.144.12.17 attack
20 attempts against mh-misbehave-ban on sonic
2020-07-15 07:51:42
190.42.16.106 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-15 08:06:53
89.248.162.247 attack
.
2020-07-15 07:45:40
212.126.121.254 attack
Fail2Ban Ban Triggered
SMTP Bruteforce Attempt
2020-07-15 08:09:13
203.192.214.203 attackbots
Automatic report - Banned IP Access
2020-07-15 07:54:12
124.123.32.98 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-15 08:09:46
51.38.225.124 attackbotsspam
Invalid user Test from 51.38.225.124 port 54938
2020-07-15 07:52:05
128.199.103.239 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-07-15 08:04:33
191.232.247.86 attackbots
SSH Invalid Login
2020-07-15 08:06:25
31.42.11.180 attack
708. On Jul 14 2020 experienced a Brute Force SSH login attempt -> 3 unique times by 31.42.11.180.
2020-07-15 07:46:30

Recently Reported IPs

89.79.18.100 183.100.185.137 197.253.124.57 211.104.64.55
180.92.226.47 8.140.172.49 136.244.91.129 64.68.3.225
153.152.223.184 80.18.39.93 185.39.46.4 75.63.47.52
35.128.42.191 7.9.3.192 141.41.39.145 48.71.1.2
44.58.252.235 248.114.219.117 164.61.59.75 23.69.187.85