Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
163.142.99.50 attackbotsspam
Jul 24 11:36:45 mail.srvfarm.net postfix/smtpd[2210862]: lost connection after RCPT from unknown[163.142.99.50]
Jul 24 11:36:45 mail.srvfarm.net postfix/smtpd[2210830]: lost connection after RCPT from unknown[163.142.99.50]
Jul 24 11:36:45 mail.srvfarm.net postfix/smtpd[2210828]: lost connection after RCPT from unknown[163.142.99.50]
Jul 24 11:36:45 mail.srvfarm.net postfix/smtpd[2210860]: lost connection after RCPT from unknown[163.142.99.50]
Jul 24 11:36:46 mail.srvfarm.net postfix/smtpd[2210864]: lost connection after RCPT from unknown[163.142.99.50]
2020-07-25 02:49:53
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.142.99.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7383
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.142.99.12.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 15:24:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 12.99.142.163.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.99.142.163.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
39.103.142.195 attackspam
REQUESTED PAGE: /e/data/js/ajax.js
2020-10-12 06:02:49
192.241.184.22 attackspambots
2020-10-11T21:23:49.038871centos sshd[30233]: Invalid user testing from 192.241.184.22 port 35172
2020-10-11T21:23:51.444041centos sshd[30233]: Failed password for invalid user testing from 192.241.184.22 port 35172 ssh2
2020-10-11T21:31:23.659553centos sshd[30785]: Invalid user test8 from 192.241.184.22 port 40784
...
2020-10-12 05:39:19
96.66.155.147 attackbots
Oct 11 23:29:58 eventyay sshd[18863]: Failed password for root from 96.66.155.147 port 51027 ssh2
Oct 11 23:33:52 eventyay sshd[18971]: Failed password for root from 96.66.155.147 port 54325 ssh2
Oct 11 23:37:41 eventyay sshd[19041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.66.155.147
...
2020-10-12 05:50:00
128.199.207.142 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-10-12 06:01:35
141.98.9.162 attack
Bruteforce detected by fail2ban
2020-10-12 05:49:28
45.148.10.65 attackbots
Invalid user ubuntu from 45.148.10.65 port 43138
2020-10-12 05:36:52
49.247.20.23 attack
Oct 11 19:33:38 game-panel sshd[28688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.20.23
Oct 11 19:33:40 game-panel sshd[28688]: Failed password for invalid user fekla from 49.247.20.23 port 34778 ssh2
Oct 11 19:36:33 game-panel sshd[28860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.20.23
2020-10-12 05:28:53
67.205.181.52 attack
DATE:2020-10-11 23:42:09, IP:67.205.181.52, PORT:ssh SSH brute force auth (docker-dc)
2020-10-12 06:00:51
141.101.69.211 attackspambots
srv02 DDoS Malware Target(80:http) ..
2020-10-12 05:42:13
111.229.43.185 attack
Oct 11 23:06:52 root sshd[11899]: Invalid user nezu from 111.229.43.185
...
2020-10-12 05:57:19
45.124.86.155 attack
Oct 11 23:13:46 lnxweb61 sshd[28217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.124.86.155
Oct 11 23:13:46 lnxweb61 sshd[28217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.124.86.155
2020-10-12 05:41:11
51.68.171.14 attackbots
2020-10-10 17:43:32.803569-0500  localhost smtpd[56735]: NOQUEUE: reject: RCPT from unknown[51.68.171.14]: 450 4.7.25 Client host rejected: cannot find your hostname, [51.68.171.14]; from= to= proto=ESMTP helo=
2020-10-12 06:02:18
46.101.114.161 attackbots
 TCP (SYN) 46.101.114.161:46187 -> port 554, len 44
2020-10-12 05:56:28
192.173.14.138 attackbotsspam
Brute forcing email accounts
2020-10-12 05:27:01
113.176.89.116 attackbots
(sshd) Failed SSH login from 113.176.89.116 (VN/Vietnam/static.vnpt.vn): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 14:48:59 optimus sshd[29423]: Invalid user hlse from 113.176.89.116
Oct 11 14:48:59 optimus sshd[29423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.89.116 
Oct 11 14:49:01 optimus sshd[29423]: Failed password for invalid user hlse from 113.176.89.116 port 54980 ssh2
Oct 11 14:55:12 optimus sshd[3613]: Invalid user seta from 113.176.89.116
Oct 11 14:55:12 optimus sshd[3613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.89.116
2020-10-12 05:59:19

Recently Reported IPs

57.166.25.243 107.228.49.250 194.155.39.11 177.218.104.37
170.84.73.111 43.239.99.175 246.58.28.195 181.100.92.30
83.66.231.39 97.230.38.174 206.114.115.43 223.81.254.188
202.26.75.120 32.21.103.158 120.2.22.128 25.100.255.231
131.226.48.64 81.208.229.33 210.60.199.195 151.104.121.36