Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Latvia

Internet Service Provider: Tele2

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.240.12.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.240.12.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062801 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 02:37:39 CST 2025
;; MSG SIZE  rcvd: 104
Host info
99.12.240.5.in-addr.arpa domain name pointer m5-240-12-99.cust.tele2.lv.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.12.240.5.in-addr.arpa	name = m5-240-12-99.cust.tele2.lv.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.101.197.15 attackbots
Chat Spam
2019-10-25 13:42:15
109.236.68.106 attack
postfix
2019-10-25 13:09:55
123.16.137.207 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:16.
2019-10-25 13:52:31
111.8.9.245 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-25 13:50:01
197.45.189.151 attackbotsspam
Automatic report - Banned IP Access
2019-10-25 13:11:18
150.138.215.34 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-25 13:07:05
14.230.55.231 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:17.
2019-10-25 13:50:24
112.74.137.212 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-25 13:43:05
150.223.7.222 attack
$f2bV_matches
2019-10-25 13:49:03
213.102.87.102 attackbotsspam
5555/tcp 5555/tcp 5555/tcp...
[2019-09-02/10-25]12pkt,1pt.(tcp)
2019-10-25 13:44:37
59.25.197.130 attack
Oct 25 07:14:14 ns381471 sshd[16012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.130
Oct 25 07:14:16 ns381471 sshd[16012]: Failed password for invalid user seoulselection from 59.25.197.130 port 47596 ssh2
2019-10-25 13:41:27
182.84.124.8 attackspam
Automatic report - Banned IP Access
2019-10-25 13:06:27
104.236.176.175 attackbotsspam
Invalid user dany from 104.236.176.175 port 36301
2019-10-25 13:10:12
159.203.182.127 attackspam
Invalid user user from 159.203.182.127 port 46951
2019-10-25 13:26:01
113.22.203.120 attackbots
Connection by 113.22.203.120 on port: 23 got caught by honeypot at 10/24/2019 8:55:47 PM
2019-10-25 13:13:08

Recently Reported IPs

45.22.117.25 44.167.194.142 52.122.202.83 54.31.154.40
54.231.245.188 44.207.132.57 44.189.214.235 43.102.197.197
42.214.179.31 43.30.232.31 44.129.216.253 42.10.199.82
42.229.227.48 43.220.201.194 42.64.150.184 42.75.249.148
4.52.111.187 40.202.251.119 4.191.152.219 4.171.133.139