Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.1.12.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.1.12.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:48:23 CST 2025
;; MSG SIZE  rcvd: 103
Host info
b'Host 99.12.1.40.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 40.1.12.99.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
195.190.132.10 attackbotsspam
[portscan] Port scan
2019-08-20 07:48:33
185.176.27.30 attackbotsspam
08/19/2019-19:22:20.426124 185.176.27.30 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-20 07:41:58
39.80.144.91 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-20 07:36:12
80.211.82.228 attack
Aug 19 22:06:40 dedicated sshd[16511]: Invalid user spot from 80.211.82.228 port 57396
2019-08-20 07:59:30
36.230.74.23 attackspam
Caught in portsentry honeypot
2019-08-20 07:54:53
187.178.233.192 attackbots
Automatic report - Port Scan Attack
2019-08-20 07:55:52
192.241.167.200 attackspambots
Aug 20 01:34:21 rpi sshd[12348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.167.200 
Aug 20 01:34:23 rpi sshd[12348]: Failed password for invalid user design2 from 192.241.167.200 port 49871 ssh2
2019-08-20 07:55:23
189.58.214.244 attackspam
Automatic report - Port Scan Attack
2019-08-20 07:32:51
142.4.203.130 attackspambots
" "
2019-08-20 07:40:58
91.121.211.34 attackspam
Aug 20 00:55:22 amit sshd\[1325\]: Invalid user pass from 91.121.211.34
Aug 20 00:55:22 amit sshd\[1325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.34
Aug 20 00:55:24 amit sshd\[1325\]: Failed password for invalid user pass from 91.121.211.34 port 50318 ssh2
...
2019-08-20 07:54:35
80.82.77.139 attackspambots
port scan and connect, tcp 1521 (oracle-old)
2019-08-20 07:24:28
202.162.208.202 attackspam
Reported by AbuseIPDB proxy server.
2019-08-20 07:26:16
121.166.187.237 attack
Aug 20 01:10:13 vps01 sshd[19215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.187.237
Aug 20 01:10:15 vps01 sshd[19215]: Failed password for invalid user demo from 121.166.187.237 port 46424 ssh2
2019-08-20 07:21:46
106.2.125.215 attackspambots
port scan and connect, tcp 3128 (squid-http)
2019-08-20 07:20:37
77.88.5.30 attackspambots
port scan and connect, tcp 443 (https)
2019-08-20 07:50:40

Recently Reported IPs

143.102.113.109 249.199.103.11 250.24.120.145 59.131.211.205
97.117.10.3 12.4.140.162 3.18.202.103 126.163.159.149
251.109.146.0 33.187.12.235 3.130.73.210 24.143.169.141
59.231.23.135 35.202.112.23 103.19.218.50 59.152.130.137
137.33.109.143 6.5.203.113 31.197.105.162 31.13.19.141