Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Atlanta

Region: Georgia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.16.158.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22112
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.16.158.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025071000 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 10 20:53:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 12.158.16.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.158.16.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.240.82.66 attack
2019-06-28T05:13:13.689614abusebot-2.cloudsearch.cf sshd\[11389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-23-240-82-66.socal.res.rr.com  user=root
2019-06-28 16:08:18
117.242.173.16 attackspambots
Brute forcing RDP port 3389
2019-06-28 15:47:06
36.73.199.195 attackspambots
Jun 28 07:52:37 lnxded64 sshd[6325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.73.199.195
Jun 28 07:52:37 lnxded64 sshd[6325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.73.199.195
2019-06-28 16:16:36
177.130.136.193 attack
SMTP-sasl brute force
...
2019-06-28 16:05:02
103.207.38.154 attack
Rude login attack (3 tries in 1d)
2019-06-28 16:19:29
194.58.71.205 attackspam
445/tcp 445/tcp 445/tcp...
[2019-05-15/06-27]10pkt,1pt.(tcp)
2019-06-28 16:20:17
133.130.110.55 attackbotsspam
6379/tcp 8161/tcp 8080/tcp...
[2019-06-26/27]4pkt,3pt.(tcp)
2019-06-28 16:10:50
79.107.200.24 attack
28.06.2019 05:13:43 Command injection vulnerability attempt/scan (login.cgi)
2019-06-28 15:52:17
89.42.149.114 attack
60001/tcp 5555/tcp
[2019-06-26/27]2pkt
2019-06-28 16:03:27
1.163.40.37 attackspam
37215/tcp 37215/tcp 37215/tcp
[2019-06-26]3pkt
2019-06-28 15:58:07
74.82.47.51 attack
7547/tcp 11211/tcp 389/tcp...
[2019-04-28/06-27]43pkt,13pt.(tcp),2pt.(udp)
2019-06-28 16:14:35
54.36.150.142 attackbots
Automatic report - Web App Attack
2019-06-28 15:56:26
222.252.42.126 attackspambots
445/tcp 445/tcp
[2019-06-26/27]2pkt
2019-06-28 16:23:06
171.238.45.101 attack
SMTP Fraud Orders
2019-06-28 16:09:22
191.7.209.166 attackspam
proto=tcp  .  spt=43688  .  dpt=25  .     (listed on Blocklist de  Jun 27)     (435)
2019-06-28 15:43:21

Recently Reported IPs

8.7.198.46 164.64.99.215 157.240.17.35 20.102.91.36
185.136.193.138 25.210.39.60 188.166.236.28 103.196.0.236
67.24.182.2 158.100.47.104 120.62.117.219 61.167.255.87
172.202.117.177 170.106.147.63 110.177.182.62 110.177.177.0
219.36.220.160 174.249.109.175 153.97.39.169 197.210.194.240