Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wilmington

Region: Delaware

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: NETIRONS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.222.4.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37230
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.222.4.12.			IN	A

;; AUTHORITY SECTION:
.			3238	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040400 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 04 16:11:33 +08 2019
;; MSG SIZE  rcvd: 116

Host info
12.4.222.158.in-addr.arpa domain name pointer 12.4.222.158.wiifi.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
12.4.222.158.in-addr.arpa	name = 12.4.222.158.wiifi.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
178.62.183.219 attackbots
Unauthorized connection attempt from IP address 178.62.183.219 on Port 445(SMB)
2020-02-20 20:42:10
162.243.134.64 attack
suspicious action Thu, 20 Feb 2020 08:15:32 -0300
2020-02-20 20:41:44
104.168.236.214 attack
SMTP/25/465/587 Probe, RCPT flood, SPAM -
2020-02-20 20:43:32
36.90.60.65 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 20:40:12
187.18.115.25 attack
Invalid user proxy from 187.18.115.25 port 34089
2020-02-20 21:00:25
110.49.71.240 attackbotsspam
sshd jail - ssh hack attempt
2020-02-20 20:38:16
189.126.168.43 attack
firewall-block, port(s): 1433/tcp
2020-02-20 21:07:28
171.14.145.10 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 21:06:08
14.136.245.194 attackspam
Feb 20 11:34:43 s1 sshd\[32396\]: Invalid user gitlab-runner from 14.136.245.194 port 45185
Feb 20 11:34:43 s1 sshd\[32396\]: Failed password for invalid user gitlab-runner from 14.136.245.194 port 45185 ssh2
Feb 20 11:36:44 s1 sshd\[2818\]: Invalid user HTTP from 14.136.245.194 port 5793
Feb 20 11:36:44 s1 sshd\[2818\]: Failed password for invalid user HTTP from 14.136.245.194 port 5793 ssh2
Feb 20 11:38:43 s1 sshd\[4792\]: Invalid user rabbitmq from 14.136.245.194 port 58561
Feb 20 11:38:43 s1 sshd\[4792\]: Failed password for invalid user rabbitmq from 14.136.245.194 port 58561 ssh2
...
2020-02-20 20:44:48
90.71.112.176 attackbots
Honeypot attack, port: 445, PTR: 176.pool90-71-112.dynamic.orange.es.
2020-02-20 20:55:01
188.53.213.183 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 20-02-2020 09:20:17.
2020-02-20 20:41:12
195.202.94.122 attackbotsspam
Hits on port : 445
2020-02-20 20:36:12
118.200.27.63 attackbotsspam
Hits on port : 5500
2020-02-20 20:37:18
177.43.129.220 attackspam
" "
2020-02-20 21:10:57
81.214.126.162 attackspam
DATE:2020-02-20 05:47:07, IP:81.214.126.162, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-20 20:44:26

Recently Reported IPs

180.43.222.93 54.37.254.57 95.6.77.61 113.160.196.4
116.196.83.181 37.115.191.192 115.52.163.31 60.208.132.243
177.37.199.175 157.33.204.197 36.224.56.170 212.12.4.78
124.188.157.132 191.102.114.162 107.6.169.250 54.77.238.42
123.9.30.23 117.212.83.152 37.107.82.249 131.161.147.249