Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: National Internet Backbone

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.99.80.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26104
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;59.99.80.12.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040100 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 01 21:41:13 +08 2019
;; MSG SIZE  rcvd: 115

Host info
Host 12.80.99.59.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 12.80.99.59.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
139.162.113.204 attack
From CCTV User Interface Log
...::ffff:139.162.113.204 - - [07/Jul/2020:23:44:18 +0000] "-" 400 179
...
2020-07-08 15:31:04
82.65.85.163 attackspambots
$f2bV_matches
2020-07-08 15:22:05
211.75.94.83 attackspambots
port 23
2020-07-08 15:19:27
222.186.15.62 attackspam
Jul  8 07:22:10 localhost sshd[101448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Jul  8 07:22:12 localhost sshd[101448]: Failed password for root from 222.186.15.62 port 39226 ssh2
Jul  8 07:22:16 localhost sshd[101448]: Failed password for root from 222.186.15.62 port 39226 ssh2
Jul  8 07:22:10 localhost sshd[101448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Jul  8 07:22:12 localhost sshd[101448]: Failed password for root from 222.186.15.62 port 39226 ssh2
Jul  8 07:22:16 localhost sshd[101448]: Failed password for root from 222.186.15.62 port 39226 ssh2
Jul  8 07:22:10 localhost sshd[101448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Jul  8 07:22:12 localhost sshd[101448]: Failed password for root from 222.186.15.62 port 39226 ssh2
Jul  8 07:22:16 localhost sshd[101448]: F
...
2020-07-08 15:38:43
129.226.117.160 attackbotsspam
2020-07-08T10:08:29.626922mail.standpoint.com.ua sshd[10617]: Invalid user jan from 129.226.117.160 port 46874
2020-07-08T10:08:29.629411mail.standpoint.com.ua sshd[10617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.117.160
2020-07-08T10:08:29.626922mail.standpoint.com.ua sshd[10617]: Invalid user jan from 129.226.117.160 port 46874
2020-07-08T10:08:31.675815mail.standpoint.com.ua sshd[10617]: Failed password for invalid user jan from 129.226.117.160 port 46874 ssh2
2020-07-08T10:10:55.639906mail.standpoint.com.ua sshd[10940]: Invalid user parisa from 129.226.117.160 port 52040
...
2020-07-08 15:24:49
85.209.0.100 attackbotsspam
Unauthorized access to SSH at 8/Jul/2020:07:35:22 +0000.
2020-07-08 15:37:49
104.227.121.208 attackspambots
(From eric@talkwithwebvisitor.com) My name’s Eric and I just came across your website - scvfamilychiropractic.com - in the search results.

Here’s what that means to me…

Your SEO’s working.

You’re getting eyeballs – mine at least.

Your content’s pretty good, wouldn’t change a thing.

BUT…

Eyeballs don’t pay the bills.

CUSTOMERS do.

And studies show that 7 out of 10 visitors to a site like scvfamilychiropractic.com will drop by, take a gander, and then head for the hills without doing anything else.

It’s like they never were even there.

You can fix this.

You can make it super-simple for them to raise their hand, say, “okay, let’s talk” without requiring them to even pull their cell phone from their pocket… thanks to Talk With Web Visitor.

Talk With Web Visitor is a software widget that sits on your site, ready and waiting to capture any visitor’s Name, Email address and Phone Number.  It lets you know immediately – so you can talk to that lead immediately… without delay… BEFOR
2020-07-08 15:21:42
177.21.193.196 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 177.21.193.196 (BR/Brazil/177-21-193-196.miragetelecom.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-08 08:14:21 plain authenticator failed for ([177.21.193.196]) [177.21.193.196]: 535 Incorrect authentication data (set_id=info)
2020-07-08 15:24:24
180.141.51.206 attackspambots
Automatic report - Port Scan Attack
2020-07-08 15:39:53
119.29.161.236 attack
$f2bV_matches
2020-07-08 15:48:12
51.83.216.216 attackbots
Jul  8 05:43:51 h2646465 sshd[22902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.216.216  user=sshd
Jul  8 05:43:53 h2646465 sshd[22902]: Failed password for sshd from 51.83.216.216 port 34110 ssh2
Jul  8 05:43:54 h2646465 sshd[22902]: Failed password for sshd from 51.83.216.216 port 34110 ssh2
Jul  8 05:43:51 h2646465 sshd[22902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.216.216  user=sshd
Jul  8 05:43:53 h2646465 sshd[22902]: Failed password for sshd from 51.83.216.216 port 34110 ssh2
Jul  8 05:43:54 h2646465 sshd[22902]: Failed password for sshd from 51.83.216.216 port 34110 ssh2
Jul  8 05:43:51 h2646465 sshd[22902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.216.216  user=sshd
Jul  8 05:43:53 h2646465 sshd[22902]: Failed password for sshd from 51.83.216.216 port 34110 ssh2
Jul  8 05:43:54 h2646465 sshd[22902]: Failed password for sshd from 51.83.216.216
2020-07-08 15:45:27
47.246.8.132 attackbotsspam
*Port Scan* detected from 47.246.8.132 (US/United States/-). 5 hits in the last 45 seconds
2020-07-08 15:20:24
77.40.3.116 attackbots
[MK-VM1] Blocked by UFW
2020-07-08 15:33:44
1.194.238.226 attackspambots
ssh brute force
2020-07-08 15:50:41
91.134.153.184 attack
2020-07-08T06:44:40.017522abusebot-5.cloudsearch.cf sshd[8911]: Invalid user imr from 91.134.153.184 port 44982
2020-07-08T06:44:40.023001abusebot-5.cloudsearch.cf sshd[8911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.153.184
2020-07-08T06:44:40.017522abusebot-5.cloudsearch.cf sshd[8911]: Invalid user imr from 91.134.153.184 port 44982
2020-07-08T06:44:41.226167abusebot-5.cloudsearch.cf sshd[8911]: Failed password for invalid user imr from 91.134.153.184 port 44982 ssh2
2020-07-08T06:44:44.641268abusebot-5.cloudsearch.cf sshd[8913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.153.184  user=root
2020-07-08T06:44:47.059140abusebot-5.cloudsearch.cf sshd[8913]: Failed password for root from 91.134.153.184 port 49536 ssh2
2020-07-08T06:44:49.654291abusebot-5.cloudsearch.cf sshd[8915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.153.184  u
...
2020-07-08 15:57:44

Recently Reported IPs

77.247.109.31 201.65.92.48 218.75.98.230 186.249.231.162
196.52.43.97 106.51.223.153 82.221.105.7 156.196.228.166
114.104.189.119 124.9.6.2 198.108.67.100 104.237.91.159
189.126.192.170 181.143.193.170 2.187.67.240 123.59.74.28
36.227.7.88 192.162.217.183 209.182.198.64 216.58.200.110