Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Saint-Louis

Region: Saint-Louis

Country: Senegal

Internet Service Provider: Universite Saint-Louis du Senegal

Hostname: unknown

Organization: Autonomous System

Usage Type: University/College/School

Comments:
Type Details Datetime
attackspam
Invalid user sybase from 196.1.99.12 port 41166
2019-08-27 06:03:07
attackbotsspam
Invalid user sybase from 196.1.99.12 port 41166
2019-08-26 09:21:51
attackbotsspam
Aug 24 17:04:39 h2177944 sshd\[12264\]: Invalid user sbserver from 196.1.99.12 port 51002
Aug 24 17:04:39 h2177944 sshd\[12264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12
Aug 24 17:04:41 h2177944 sshd\[12264\]: Failed password for invalid user sbserver from 196.1.99.12 port 51002 ssh2
Aug 24 17:10:26 h2177944 sshd\[12451\]: Invalid user alexandru from 196.1.99.12 port 44537
Aug 24 17:10:26 h2177944 sshd\[12451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12
...
2019-08-24 23:31:31
attack
Aug 23 20:16:47 ns37 sshd[26227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12
Aug 23 20:16:49 ns37 sshd[26227]: Failed password for invalid user armand from 196.1.99.12 port 58153 ssh2
Aug 23 20:22:14 ns37 sshd[26489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12
2019-08-24 02:48:47
attackspam
Aug 21 03:33:53 vpn01 sshd\[29986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12  user=root
Aug 21 03:33:56 vpn01 sshd\[29986\]: Failed password for root from 196.1.99.12 port 58049 ssh2
Aug 21 03:37:25 vpn01 sshd\[30002\]: Invalid user test from 196.1.99.12
2019-08-21 10:16:26
attack
Aug 20 02:06:15 mail sshd[27950]: Invalid user test from 196.1.99.12
...
2019-08-20 08:15:28
attackspambots
2019-08-17T12:56:00.614644abusebot-6.cloudsearch.cf sshd\[13015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12  user=root
2019-08-17 21:13:39
attackspambots
Jul 29 14:27:44 *** sshd[17753]: User root from 196.1.99.12 not allowed because not listed in AllowUsers
2019-07-29 23:44:01
attack
Invalid user setup from 196.1.99.12 port 48617
2019-07-28 15:13:54
attack
Invalid user postgres from 196.1.99.12 port 45324
2019-07-28 06:05:31
attackbotsspam
2019-07-26T19:04:33.550409abusebot-2.cloudsearch.cf sshd\[17539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12  user=root
2019-07-27 03:25:17
attackspam
Invalid user postgres from 196.1.99.12 port 45324
2019-07-24 15:42:08
attack
Jul 23 01:41:50 vmd17057 sshd\[2129\]: Invalid user postgres from 196.1.99.12 port 38994
Jul 23 01:41:50 vmd17057 sshd\[2129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12
Jul 23 01:41:52 vmd17057 sshd\[2129\]: Failed password for invalid user postgres from 196.1.99.12 port 38994 ssh2
...
2019-07-23 10:20:44
attackspam
Invalid user simon from 196.1.99.12 port 36198
2019-07-13 20:04:03
attackspam
" "
2019-07-11 12:45:55
attackspambots
Jul  9 04:40:29 mail sshd\[29186\]: Invalid user sgi from 196.1.99.12 port 43140
Jul  9 04:40:29 mail sshd\[29186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12
...
2019-07-09 15:03:54
attackbots
Jul  4 10:57:09 MK-Soft-VM6 sshd\[30816\]: Invalid user jhall from 196.1.99.12 port 45763
Jul  4 10:57:09 MK-Soft-VM6 sshd\[30816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12
Jul  4 10:57:11 MK-Soft-VM6 sshd\[30816\]: Failed password for invalid user jhall from 196.1.99.12 port 45763 ssh2
...
2019-07-04 19:48:03
attackbotsspam
Jul  2 19:27:04 MK-Soft-Root1 sshd\[13114\]: Invalid user dylan from 196.1.99.12 port 58547
Jul  2 19:27:04 MK-Soft-Root1 sshd\[13114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12
Jul  2 19:27:06 MK-Soft-Root1 sshd\[13114\]: Failed password for invalid user dylan from 196.1.99.12 port 58547 ssh2
...
2019-07-03 01:37:08
attackspam
Invalid user jester from 196.1.99.12 port 49394
2019-06-27 06:14:58
attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-06-25 03:59:28
attackspambots
SSH Brute Force
2019-06-23 22:35:35
attackbots
IP attempted unauthorised action
2019-06-23 15:42:51
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.1.99.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42417
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.1.99.12.			IN	A

;; AUTHORITY SECTION:
.			3274	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019032900 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Mar 29 23:58:20 +08 2019
;; MSG SIZE  rcvd: 115

Host info
Host 12.99.1.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 12.99.1.196.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
66.42.22.221 attackspambots
Unauthorized connection attempt detected from IP address 66.42.22.221 to port 23
2020-04-13 04:38:47
84.238.55.212 attackbots
Unauthorized connection attempt detected from IP address 84.238.55.212 to port 23
2020-04-13 04:31:43
121.158.171.165 attack
Unauthorized connection attempt detected from IP address 121.158.171.165 to port 23
2020-04-13 04:25:34
108.24.54.235 attackbots
Draytek Vigor Remote Command Execution Vulnerability
2020-04-13 04:27:10
201.197.203.96 attackbotsspam
Unauthorized connection attempt detected from IP address 201.197.203.96 to port 80
2020-04-13 04:12:33
94.60.81.210 attackspam
Unauthorized connection attempt detected from IP address 94.60.81.210 to port 23
2020-04-13 04:28:15
185.69.28.51 attackspam
Unauthorized connection attempt detected from IP address 185.69.28.51 to port 8080
2020-04-13 04:17:39
74.105.241.2 attackbotsspam
Unauthorized connection attempt detected from IP address 74.105.241.2 to port 8089
2020-04-13 04:36:21
5.160.209.9 attack
Unauthorized connection attempt detected from IP address 5.160.209.9 to port 8080
2020-04-13 04:08:15
222.186.30.167 attackbots
2020-04-12T14:55:46.222413homeassistant sshd[11564]: Failed password for root from 222.186.30.167 port 26874 ssh2
2020-04-12T20:41:57.388238homeassistant sshd[31218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
...
2020-04-13 04:45:34
81.234.28.100 attack
Unauthorized connection attempt detected from IP address 81.234.28.100 to port 23
2020-04-13 04:32:00
96.224.32.215 attackspambots
Unauthorized connection attempt detected from IP address 96.224.32.215 to port 1433
2020-04-13 04:27:28
87.76.60.140 attack
Unauthorized connection attempt detected from IP address 87.76.60.140 to port 26
2020-04-13 04:30:57
167.114.251.164 attack
2020-04-12T20:38:11.964680shield sshd\[31096\]: Invalid user admin from 167.114.251.164 port 55534
2020-04-12T20:38:11.968931shield sshd\[31096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.ip-167-114-251.eu
2020-04-12T20:38:14.095577shield sshd\[31096\]: Failed password for invalid user admin from 167.114.251.164 port 55534 ssh2
2020-04-12T20:41:52.190205shield sshd\[31792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.ip-167-114-251.eu  user=root
2020-04-12T20:41:54.325231shield sshd\[31792\]: Failed password for root from 167.114.251.164 port 59937 ssh2
2020-04-13 04:48:07
201.114.189.100 attackbots
Unauthorized connection attempt detected from IP address 201.114.189.100 to port 81
2020-04-13 04:12:48

Recently Reported IPs

198.199.122.228 195.251.49.17 195.154.211.76 190.122.104.121
178.128.18.68 178.32.219.209 178.32.141.39 173.25.188.20
170.231.81.165 170.80.28.203 151.236.46.104 142.93.247.243
139.59.21.101 134.175.114.210 128.199.255.146 123.207.150.226
121.8.154.178 118.25.93.64 111.230.63.104 106.0.36.114