Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Alpharetta

Region: Georgia

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.77.117.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.77.117.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 13:32:33 CST 2025
;; MSG SIZE  rcvd: 105
Host info
12.117.77.99.in-addr.arpa domain name pointer 99-77-117-12.lightspeed.tukrga.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.117.77.99.in-addr.arpa	name = 99-77-117-12.lightspeed.tukrga.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.101.107.190 attack
Aug 16 14:55:12 game-panel sshd[16542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.107.190
Aug 16 14:55:14 game-panel sshd[16542]: Failed password for invalid user wb from 5.101.107.190 port 45755 ssh2
Aug 16 15:02:46 game-panel sshd[16973]: Failed password for root from 5.101.107.190 port 50447 ssh2
2020-08-16 23:13:04
180.107.109.21 attack
Aug 16 16:59:57 fhem-rasp sshd[6121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.107.109.21  user=root
Aug 16 16:59:59 fhem-rasp sshd[6121]: Failed password for root from 180.107.109.21 port 47689 ssh2
...
2020-08-16 23:12:04
178.32.163.202 attack
Aug 16 16:58:11 abendstille sshd\[15179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.163.202  user=root
Aug 16 16:58:14 abendstille sshd\[15179\]: Failed password for root from 178.32.163.202 port 54606 ssh2
Aug 16 17:02:02 abendstille sshd\[18928\]: Invalid user sensor from 178.32.163.202
Aug 16 17:02:02 abendstille sshd\[18928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.163.202
Aug 16 17:02:04 abendstille sshd\[18928\]: Failed password for invalid user sensor from 178.32.163.202 port 35976 ssh2
...
2020-08-16 23:24:27
157.245.213.209 attackbots
Aug 16 14:31:49 django-0 sshd[12049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.213.209 
Aug 16 14:31:49 django-0 sshd[12049]: Invalid user oracle from 157.245.213.209
Aug 16 14:31:51 django-0 sshd[12049]: Failed password for invalid user oracle from 157.245.213.209 port 44974 ssh2
...
2020-08-16 22:58:26
165.227.7.5 attack
prod6
...
2020-08-16 22:55:55
212.0.135.78 attackspam
Aug 16 14:15:09 vps sshd[2821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.0.135.78 
Aug 16 14:15:10 vps sshd[2821]: Failed password for invalid user ftptest from 212.0.135.78 port 14310 ssh2
Aug 16 14:23:55 vps sshd[3459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.0.135.78 
...
2020-08-16 23:21:06
138.0.90.82 attack
Aug 16 15:38:09 ncomp sshd[27951]: Invalid user ntpo from 138.0.90.82
Aug 16 15:38:09 ncomp sshd[27951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.0.90.82
Aug 16 15:38:09 ncomp sshd[27951]: Invalid user ntpo from 138.0.90.82
Aug 16 15:38:11 ncomp sshd[27951]: Failed password for invalid user ntpo from 138.0.90.82 port 35324 ssh2
2020-08-16 23:27:16
45.144.65.49 attackbots
Aug 16 17:03:23 jane sshd[10840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.65.49 
Aug 16 17:03:24 jane sshd[10840]: Failed password for invalid user carbon from 45.144.65.49 port 36842 ssh2
...
2020-08-16 23:06:20
191.233.198.99 attackbots
(sshd) Failed SSH login from 191.233.198.99 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 16 17:27:02 s1 sshd[30103]: Invalid user event from 191.233.198.99 port 49320
Aug 16 17:27:05 s1 sshd[30103]: Failed password for invalid user event from 191.233.198.99 port 49320 ssh2
Aug 16 17:53:56 s1 sshd[30554]: Invalid user liwl from 191.233.198.99 port 53304
Aug 16 17:53:58 s1 sshd[30554]: Failed password for invalid user liwl from 191.233.198.99 port 53304 ssh2
Aug 16 17:55:39 s1 sshd[30583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.233.198.99  user=root
2020-08-16 23:04:27
104.248.22.250 attackspambots
104.248.22.250 - - [16/Aug/2020:13:24:06 +0100] "POST /wp-login.php HTTP/1.1" 200 2435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.22.250 - - [16/Aug/2020:13:24:12 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.22.250 - - [16/Aug/2020:13:24:15 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-16 23:05:33
112.85.42.176 attackspambots
Aug 16 15:07:38 localhost sshd\[32339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Aug 16 15:07:41 localhost sshd\[32339\]: Failed password for root from 112.85.42.176 port 11810 ssh2
Aug 16 15:07:44 localhost sshd\[32339\]: Failed password for root from 112.85.42.176 port 11810 ssh2
...
2020-08-16 23:09:03
129.211.17.22 attackspam
Aug 16 14:27:11 gospond sshd[14593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.17.22 
Aug 16 14:27:11 gospond sshd[14593]: Invalid user finn from 129.211.17.22 port 48066
Aug 16 14:27:13 gospond sshd[14593]: Failed password for invalid user finn from 129.211.17.22 port 48066 ssh2
...
2020-08-16 23:08:25
189.44.39.226 attackspam
20/8/16@08:23:43: FAIL: Alarm-Network address from=189.44.39.226
20/8/16@08:23:44: FAIL: Alarm-Network address from=189.44.39.226
...
2020-08-16 23:36:06
46.101.204.40 attackbotsspam
Aug 16 14:22:04 inter-technics sshd[2845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.40  user=root
Aug 16 14:22:06 inter-technics sshd[2845]: Failed password for root from 46.101.204.40 port 53204 ssh2
Aug 16 14:27:22 inter-technics sshd[3345]: Invalid user jan from 46.101.204.40 port 35034
Aug 16 14:27:22 inter-technics sshd[3345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.40
Aug 16 14:27:22 inter-technics sshd[3345]: Invalid user jan from 46.101.204.40 port 35034
Aug 16 14:27:25 inter-technics sshd[3345]: Failed password for invalid user jan from 46.101.204.40 port 35034 ssh2
...
2020-08-16 23:20:34
111.230.219.156 attackbots
Aug 16 14:24:03 vps639187 sshd\[3050\]: Invalid user carlos1 from 111.230.219.156 port 47002
Aug 16 14:24:03 vps639187 sshd\[3050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.219.156
Aug 16 14:24:05 vps639187 sshd\[3050\]: Failed password for invalid user carlos1 from 111.230.219.156 port 47002 ssh2
...
2020-08-16 23:18:06

Recently Reported IPs

176.174.107.226 205.126.160.25 247.241.125.188 83.229.98.117
13.206.107.57 202.12.111.226 249.58.83.243 76.87.140.156
228.204.9.148 163.191.212.134 21.59.115.126 20.224.31.159
219.58.89.232 67.91.43.153 221.62.179.16 191.191.89.197
162.37.146.199 147.204.88.3 49.84.222.255 158.116.54.28