Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.76.142.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33122
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.76.142.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 03:04:55 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 12.142.76.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.142.76.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
39.110.250.69 attackspam
Nov 16 15:20:09 ws19vmsma01 sshd[8185]: Failed password for root from 39.110.250.69 port 32842 ssh2
...
2019-11-17 04:25:26
103.82.166.31 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-17 04:50:33
142.93.222.197 attackbotsspam
Nov 16 18:53:45 SilenceServices sshd[24638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
Nov 16 18:53:47 SilenceServices sshd[24638]: Failed password for invalid user teste from 142.93.222.197 port 50638 ssh2
Nov 16 18:57:41 SilenceServices sshd[27174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.197
2019-11-17 05:05:21
181.49.219.114 attackbots
SSH invalid-user multiple login attempts
2019-11-17 04:28:29
222.128.93.67 attackspam
Nov 16 20:52:12 server sshd\[1195\]: Invalid user joe from 222.128.93.67
Nov 16 20:52:12 server sshd\[1195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.128.93.67 
Nov 16 20:52:13 server sshd\[1195\]: Failed password for invalid user joe from 222.128.93.67 port 46664 ssh2
Nov 16 21:10:30 server sshd\[6031\]: Invalid user hovedfagskonto from 222.128.93.67
Nov 16 21:10:30 server sshd\[6031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.128.93.67 
...
2019-11-17 04:38:22
66.70.206.215 attackspam
Invalid user bronzovic from 66.70.206.215 port 39780
2019-11-17 05:06:05
14.160.52.170 attack
Unauthorized connection attempt from IP address 14.160.52.170 on Port 445(SMB)
2019-11-17 04:42:08
180.76.119.77 attackbots
Nov 16 19:26:40 vps691689 sshd[16372]: Failed password for root from 180.76.119.77 port 53392 ssh2
Nov 16 19:31:11 vps691689 sshd[16429]: Failed password for root from 180.76.119.77 port 60694 ssh2
...
2019-11-17 04:40:33
218.249.69.210 attackspam
Invalid user surray from 218.249.69.210 port 23578
2019-11-17 04:51:03
81.182.241.76 attackspam
Invalid user cruickshank from 81.182.241.76 port 34422
2019-11-17 04:27:21
213.171.45.178 attackbots
A spam email was sent from this SMTP server. This kind of spam emails had the following features.:
- They attempted to camouflage the SMTP server with a KDDI's legitimate server. 
- The domain of URLs in the messages was best-self.info (103.212.223.59).
2019-11-17 04:38:48
80.211.128.151 attackbotsspam
Nov 16 12:08:43 mockhub sshd[3327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.128.151
Nov 16 12:08:44 mockhub sshd[3327]: Failed password for invalid user ttt147 from 80.211.128.151 port 60228 ssh2
...
2019-11-17 04:29:18
148.235.82.68 attackbots
ssh failed login
2019-11-17 05:01:20
124.118.186.230 attackspambots
Automatic report - Port Scan Attack
2019-11-17 05:08:13
142.93.201.168 attack
SSH Brute-Force attacks
2019-11-17 05:03:42

Recently Reported IPs

199.114.228.166 221.90.129.19 63.2.173.201 83.2.94.5
78.126.85.222 231.123.163.165 139.195.115.54 194.204.172.50
131.87.218.171 87.152.119.232 249.212.158.53 115.1.115.99
103.14.178.117 176.171.2.101 120.45.50.113 132.225.118.87
150.233.241.37 169.2.27.30 244.248.195.197 127.61.73.253